A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
2015
USENIX Security Symposium
In this paper, we present a passive detection technique for combating simboxes at a cellular base station. ...
In so doing, we demonstrate that fraud that degrades network quality and costs telecommunications billions of dollars annually can easily be detected and counteracted in real time. ...
Michael Good was instrumental in early work 24th USENIX Security Symposium 847 on this project that was not published in this paper, and conversations with Charles Lever were especially helpful to work out ...
dblp:conf/uss/ReavesSBCT15
fatcat:blqmjwetjjf7npru5zny3nw6k4
A Plethoric Literature Survey on SIMBox Fraud Detection in Telecommunication Industry
2022
Direct Research Journal of Engineering and Information Technology
SIMBox or Interconnect Bypass Fraud is one of the most rapidly emerging frauds in today's telecommunications industry, costing the industry between $3 and $7 billion USD in annual revenue losses. ...
Fraudsters effectively avoid the inter-connect toll charging points by exploiting the difference between the high interconnect rates and the low retail price for on-network calls, thereby avoiding payment ...
Also, we acknowledge the tremendous cooperation of Nigerian mobile telecommunication company and fraud department of MTN. ...
doi:10.26765/drjeit14035036
fatcat:wthbftjvjngbvjdlfgqd5kuzhe
Threat modeling framework for mobile communication systems
[article]
2020
arXiv
pre-print
We also provide concrete examples of using the framework for modeling the attacks individually and comparing them with similar ones. ...
Due to the complex nature of mobile communication systems, most of the security efforts in its domain are isolated and scattered across underlying technologies. ...
Most commonly, such techniques aim for billing frauds [186] and denial of service [53, 166] using SIP protocols. e GPRS tra c emerging from the interconnection and roaming network can also give initial ...
arXiv:2005.05110v1
fatcat:icrim7s3nnck3edcmxnb7bo3hu
Distributed Denial-of-Service (DDoS) Attacks and Defence Mechanisms in Various Web-enabled Computing Platforms
2022
International Journal on Semantic Web and Information Systems (IJSWIS)
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities. ...
One of the simple yet powerful attack, lurking around the Internet today, is the Distributed Denial-of-Service (DDoS) attack. ...
Ingress/Egress packet filtering (Aamir & Zaidi, 2014; Peng et al., 2007; Zargar et al., 2013 ) is one of the early countermeasures against DDoS attacks, deployed at the edge routers of the networks. ...
doi:10.4018/ijswis.297143
fatcat:imoau72665dxbmfdoxvntbyyiq
Electronic Commerce: A Half-Empty Glass?
2000
Communications of the Association for Information Systems
Yet, they need to be worked out if electronic commerce is to be successful in both the developed and the underdeveloped world. ...
The first theme--building trust for users and consumers--involves privacy protection, security, consumer protection, authentication and confidentiality, and access blocking. ...
Certificate services will be widely available and applications will use PKI right out of the box." [Levitt 1999 ] He warns, though, that PKI is still a challenging application. ...
doi:10.17705/1cais.00318
fatcat:bm623paj6fc27odj65zr6epxpy
Distributed Vehicular Computing at the Dawn of 5G: a Survey
[article]
2022
arXiv
pre-print
As a major part of 5G, edge computing allows data offloading and computation at the edge of the network, ensuring low-latency and context-awareness, and 5G efficiency. ...
Relatedly, the fifth generation of cellular networks (5G) was developed to respond to communication challenges by providing for low-latency, high-reliability, and high bandwidth communications. ...
ACKNOWLEDGMENT This research has been supported in part by project 16214817 from the Research Grants Council of Hong Kong, and the 5GEAR and FIT projects from Academy of Finland. ...
arXiv:2001.07077v2
fatcat:ixgjkwdx6zdsvfcpviptpf32by
Security and privacy for 6G: A survey on prospective technologies and challenges
[article]
2021
arXiv
pre-print
at Terahertz bands and attacks against pervasive intelligence. ...
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. ...
in cellular networks. ...
arXiv:2108.11861v1
fatcat:o7fgtm4tobfk5knltojut6xpyi
Strategy for Fintech Applications in the Pacific Island Countries
2019
Departmental Papers / Policy Papers
This paper looks at how some elements of the Bali Fintech Agenda could be used in Pacific island countries, which face significant financial-structural challenges. ...
The agenda aims to harness the potential of fintech while managing associated risks. ...
The authors are grateful to Kenneth Kang, Alison Stuart, and our colleagues who provided useful comments, guidance, and support. ...
doi:10.5089/9781498326735.087
fatcat:ru34iyp3cbeqxnbfyx66tzabjy
D5.1 Key Technologies for IoT Data Management Benchmark
2021
Zenodo
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications. ...
This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies. ...
collected in a block at once; • Blocks are created by miners who try to make the block acceptable to the network by guessing a value of a nonce which depends on the difficulty of the network and is also ...
doi:10.5281/zenodo.5084813
fatcat:ssllddbo7rda7fadthu26ajrzu
Net neutrality - How relevant is it to Australia?
2009
Telecommunications Journal of Australia
ACKNOWLEDGEMENTS Portions of this essay come from earlier testimony before the U.S. Congress. I would like to thank Derek Slater, Carolyn Dalton, and Rick Whitt at Google for their assistance. ...
ACKNOWLEDGEMENTS The authors benefited from generous assistance from colleagues and interns including Alana Maurushat, Reg Leones, Adam Arnold and Joanna Chow. ...
NTT now only proposes that ISPs bear the cost of network termination equipment at the edge of the NGN, or where their Internet connection is interconnected with the NGN. ...
doi:10.2104/tja09022
fatcat:iyhfeahrmverdoaskclswtokx4
D1.1 - State of the Art Analysis
2021
Zenodo
The deliverable starts with an overview of AI applications and edge computing market trends. ...
In the last part of the deliverable, we report an overview of the performance modelling solutions, security, and privacy problems for AI applications in edge environments. ...
Looking at the European scenario, beyond professional services, that will be interested in the build out of the edge value chain, to provide AI solutions at the edge to customers in other industries, Retail ...
doi:10.5281/zenodo.6372377
fatcat:f6ldfuwivbcltew4smiiwphfty
A Comparison of Recruitment Methods for an mHealth Intervention Targeting Mothers: Lessons from the Growing Healthy Program
2016
Journal of Medical Internet Research
fraud. ...
Box 1.1 (continued) Box carried out over Wi-Fi. Indeed, the "mobile" in "mobile applications" refers as much to the type of device as the manner of usage. ...
Summarizing current thinking and seeking to inform the debate on the use of mobile phones to improve livelihoods, the report looks, in particular, at key ecosystem-based applications in agriculture, health ...
doi:10.2196/jmir.5691
pmid:27634633
pmcid:PMC5043120
fatcat:rbg45p6xzzcgxe3b43jnav7nuy
A Survey on Metaverse: Fundamentals, Security, and Privacy
[article]
2022
arXiv
pre-print
At the same time, a series of fundamental challenges (e.g., scalability and interoperability) can arise in metaverse security provisioning owing to the intrinsic characteristics of metaverse, such as immersive ...
Then, we discuss the security and privacy threats, present the critical challenges of metaverse systems, and review the state-of-the-art countermeasures. ...
For example, adversaries may be able to out-vote genuine nodes by producing sufficient Sybil identities to refuse to deliver or receive some blocks, thereby effectively blocking other nodes from a blockchain ...
arXiv:2203.02662v3
fatcat:iudwizbvp5cv3fga6lpvydlrna
Federalism and the Telephone: The Case for Preemptive Federal Deregulation in the New World of Intermodal Competition
2007
Social Science Research Network
See Mike Farrell, All's Quiet on the Cutting Edge, MULTICHANNEL NEWS, Feb. 23, 2004, available at http://www.multichannel.com/article/CA382799.html. ...
in the cell phone subscriber's home market where the call will access the subscriber's cellular network. ...
doi:10.2139/ssrn.959720
fatcat:epakugjigffbhdk5ibyvc4goby
Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)
2022
IEEE Access
The integration of power networks with information and communication technologies enables pervasive control, automation and connectivity from the energy generation power plants to the consumption level ...
Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of energy and information between customers and suppliers. ...
Identity theft can occur at various SG scales, from stealing IP meters to impersonating network suppliers and creating fraud against users. ...
doi:10.1109/access.2022.3174259
fatcat:txuebjhpnre73cq5lbx77ugmhq
« Previous
Showing results 1 — 15 out of 131 results