|
References [1] J. Zander; K-W Sung; B. Slimane. (2016), “Fundamentals of Mobile Data Networks”. Cambridge University Press, ISBN 1107143217. [2] Murat Oğul and Selçuk Baktır. (2013), “Practical Attacks on Mobile Cellular Networks and Possible Countermeasures ”. ISSN, 1999-5903. [3] Masood Khosroshahy, Dongyu Qiu, and Mustafa K. Mehmet Ali. (2013), “Botnets in 4G Cellular Networks: Platforms toLaunch DDoS Attacks Against the Air Interface”. International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), DOI: 10.1109/MoWNet.2013.6613793 . [4] Preimesberger, Chris. (2014), “DDoS Attack Volume Escalates as New Methods Emerge”. eWeek. May 28, 2014. [5] Prince, Matthew. (2016), “Empty DDoS Threats: Meet the Armada Collective”. CloudFlare, Retrieved 18 May 2016. [6] Yung-Hsuan Chao. (2008), “The Study of Anonymous Secure Routing Protocol for Mobile Ad Hoc Networks”. NTHU. [7] Gabrielle Kratsas. (2014), “Cellphone use causes over 1 in 4 car accidents”. USATODAY. [8] Stephen Northcutt , “Security Laboratory: Methods of Attack Series”. SANS technology institute. [9] Kahn, David. (1974), “The Codebreakers: The Story of Secret Writing”. Macmillan, ISBN 0-02-560460-0. [10] Ricciato, F., Coluccia, A., D’Alconzo A., The Codebreakers: “A review of DoS attack models for 3G cellular networks from a system-design perspective” Comput. Commun, 2010, 33, 551–558. [11] Wu, Z., Zhou, X., Yang, F. (2010), “Defending against DoS Attacks on 3G Cellular Networks via Randomization Method”. In Proceedings of the 2010International Conference on Educational and Information Technology (ICEIT 2010), Chongqing, China, 17–19 September 2010. [12] Zhao, B., Chi, C., Gao, W., Zhu, S., Cao, G.. (2009), “A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses”. the 28th IEEE International Conference on Computer Communications (INFOCOM 2009), Rio de Janeiro, Brazil, 19–25 April 2009. [13] P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel,and T. La Porta 2009, “On cellular botnets: measuring the impact ofmalicious devices on a cellular network core”. Proc. 16thACM conference on Computer and communications security, NY, USA: ACM, 2009, pp. 223–234. |