SS7 vulnerabilities—a survey and implementation of machine learning vs rule based filtering for detection of SS7 network attacks

K Ullah, I Rashid, H Afzal, MMW Iqbal… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The Signalling System No. 7 (SS7) is used in GSM/UMTS telecommunication technologies
for signalling and management of communication. It was designed on the concept of private …

Location-dependent query processing: Where we are and where we are heading

S Ilarri, E Mena, A Illarramendi - ACM computing surveys (CSUR), 2010 - dl.acm.org
The continuous development of wireless networks and mobile devices has motivated an
intense research in mobile data services. Some of these services provide the user with …

[CARTE][B] Wireless communications & networking

V Garg - 2010 - books.google.com
This book provides comprehensive coverage of mobile data networking and mobile
communications under a single cover for diverse audiences including managers, practicing …

[CARTE][B] Location-based services: fundamentals and operation

A Küpper - 2005 - books.google.com
Location-based Services (LBSs) are mobile services for providing information that has been
created, compiled, selected or filtered under consideration of the users' current locations or …

Engineering automotive software

M Broy, IH Kruger, A Pretschner… - Proceedings of the …, 2007 - ieeexplore.ieee.org
The amount of software in cars grows exponentially. Driving forces of this development are
the availability of cheaper and more powerful hardware, as well as the demand for …

Short message transmission and handover procedures

G Velev, J Bachmann, S Ikeda - US Patent 9,247,471, 2016 - Google Patents
The present invention relates to an improved method for handover of a mobile node from E-
UTRAN to UTRAN in a scenario where SMS is the only service of the mobile node. The …

Optimized energy aware 5G network function virtualization

AN Al-Quzweeni, AQ Lawey, TEH Elgorashi… - Ieee …, 2019 - ieeexplore.ieee.org
In this paper, network function virtualization (NFV) is identified as a promising key
technology, which can contribute to energy-efficiency improvement in 5G networks. An …

Man-in-the-middle in tunnelled authentication protocols

N Asokan, V Niemi, K Nyberg - International Workshop on Security …, 2003 - Springer
Deploying a new security protocol is expensive. This encourages system designers to look
for ways of re-using existing infrastructure. When security protocols and components are re …

[CARTE][B] The next generation CDMA technologies

HH Chen - 2007 - books.google.com
Future wireless communication systems should be operating mainly, if not completely, on
burst data services carrying multimedia traffic. The need to support high-speed burst traffic …

Prometheus: Toward quality-of-experience estimation for mobile apps from passive network measurements

V Aggarwal, E Halepovic, J Pang… - Proceedings of the 15th …, 2014 - dl.acm.org
Cellular network operators are now expected to maintain a good Quality of Experience
(QoE) for many services beyond circuit-switched voice and messaging. However, new smart …