Abstract
Many emerging Internet of Things devices, gateways and networks, rely either on mobile networks or on Internet Protocols to support their connectivity. However it is known that both types of networks are susceptible to different types of attacks that can significantly disrupt their operations. In particular 3rd and 4th generation mobile networks experience signalling related attacks, such as signalling storms, that have been a common problem in the last decade. This paper presents a generic model of a mobile network that includes different end user behaviours, including possible attacks to the signalling system. We then suggest two attack detection mechanisms, and evaluate them by analysis and simulation based on the generic mobile network model. Our findings suggest that mobile networks can be modified to be able to automatically detect attacks. Our results also suggest that attack mitigation can be carriedout both via the signalling system and on a “per mobile terminal” basis.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
The security of computing systems is based on three basic principles: confidentiality, integrity and availability. System availability of networks and services can be significantly impaired by Denial of Service (DoS) attacks which can take various forms which differ according to the technology being considered. Thus DoS attacks for IP (Internet Protocol) networks differ significantly from DoS attacks against mobile networks.
Mobile networks are susceptible to DoS attacks, mostly because of the networks’ openness to the Internet, the use of deterministic procedures, and the use of basic design principles based on “typical” user behaviour. In the last ten years, there were huge advances from an algorithmic, manufacturing ‘and software perspective, pushing forward the innovation of mobile smart devices and applications, which operate over a mobile network - while the network itself did not keep up with the pace. One of the problems caused by these circumstances, is the appearance of DoS attacks known as signalling storms, which overload the control plane of the mobile network, unlike many previously known data plane flooding attacks [26, 37].
Network security is ranked as one of the top priorities for future self-aware networks [18], which is why there is well established research in the field. Furthermore, while work in [21, 33] focuses on a general defensive approach against DoS attacks in future networks, signalling storm specific research can roughly be categorised in the following groups: problem definition and attacks classification [5, 30, 31, 41]; measurements in real operating networks [11, 40]; modelling and simulation [1, 27]; impact of attacks on energy consumption [10, 12]; attacks detection and mitigation, using counters [19, 20, 38], change-point detection techniques [32, 42], IP packet analysis [28], randomisation in RRC’s functions [45], software changes in the mobile terminal [8, 34], monitoring terminal’s bandwidth usage [39], and detection using techniques from Artificial Intelligence [2]. As we look to the future, such as the Internet of Things (IoT), various forms of attacks will also have to be considered [6, 9].
The communication schemes may be opportunistic [25] and attacks may use similar opportunistic means to access IoT devices, viruses and worms will continue being important threats [16] and they can diffuse opportunistically through a network [17], video input is one of the uses of the IoT and video encoding [7] can also be specifically targeted by attacks. Furthermore, many network services are organised to flow over overlay networks [4] that cooperate with the Cloud [43, 44] to offer easy deployable and flexible services for the mobile network control plane. Thus research needs to remain alert to such developments.
In this paper we mainly use stochastic modelling techniques, in order to represent complex communication protocols, such as the Radio Resource Control (RRC), in simplified mathematic terms. In particular we use open and closed queueing networks with multiple classes of calls. The analysis of these systems is first described by Jackson [29], Basket et al. [3], and Gelenbe [14, 15, 22,23,24], among others. A second approach is used through discrete event simulation, whose results in many cases are comparable to queueing network models. More precisely, we are using a specialised Mobile Networks Security Simulator (SECSIM) created by in research group [27].
The remainder of the paper is organised as follows. In Sect. 2 we present a queueing network model of a generic architecture of a mobile network, and model normal and attack behaviour in Sect. 2.2. In Sect. 3 we present two attack detection techniques, respectively in Sects. 3.1 and 3.2, and a mitigation technique in Sect. 3.3. Finally, Sect. 4 concludes the paper.
2 Network Model
The proposed model describes a general network architecture, focusing on its radio access part, from the perspective of both, the control and data (user) plane. It’s envisioned to represent different mobile network technologies, which is achieved through representing the resource allocation in the data plane as a “black box” where different technologies’ sub-models can be plugged in, while keeping the control plane unchanged. The core part of the model consists only the basic elements of the architecture, such as multiple Base Station (BS) nodes connected to a single network controller consisting one Signalling Server (SS) node, and the communication stage nodes.
2.1 Model Description
An example workflow captured by our model goes as follows. When a mobile terminal wants to communicate, it sends a connection setup request through the control plane of the network, which needs to be processed at the BS and the SS. If admitted, the mobile proceeds to communicate in the data plane of the network, in sessions (each comprising multiple data packets), which we denote as calls in the rest of the paper. If a call is blocked, then the mobile may either leave the network or attempt to reconnect with a probability that depends on the type of call. There are two types of calls or connection setup requests in the network: (i) normal calls representing traffic from legitimate users or applications, and (ii) attack traffic generated by malicious or malfunctioning applications that may overload the network. The network model is open with calls joining and leaving the network, representing for example the arrival and departure of mobiles to WiFi areas. Its parameters are defined in Table 1 where the superscript \(r\in \{n,a\}\) denotes the class of a call (normal n or attack a) (Fig. 1).
We assume calls arrive from outside the network according to independent Poisson processes and the service times in each node are independent and exponentially distributed. Since calls may be blocked at the SS due to congestion, the aggregate arrival processes at different parts of the network are not Poisson. Nevertheless, to simplify matters so as to obtain analytical solutions, we make the approximation that all flows within the network are Poisson. The service time distribution for the BS and SS nodes in the signalling stage is same for both classes of calls, because the signalling procedure undertaken by the network does not distinguish call classes. On the other hand, in the communication stage, the service time distribution is distinct for different classes of calls because of the different bandwidth usage behaviour of the normal and malicious calls.
The flow of calls in the above model could be expressed in a closed form as follows. The total arrival rate of class-r connection requests at BS i is the sum of the rates of (i) new calls, (ii) returning calls that timed out, and (iii) calls that were blocked at a cell j by the SS and are attempting to connect at cell i:
where the proportion of blocked calls \(p_{ib}^r\) and the rate of admitted calls that has timed out \(\gamma ^r_i\) depend on \(\lambda ^r_j,~\forall j\). The model as presented is suitable for modelling different mobile technologies under an attack. More details, and a comparison of the attacks’ influence on two groups of technologies, are presented in [36].
2.2 User Behaviour Model
An important part of the network model is the user behaviour model. In general, the two classes of calls have different service time distributions. A normal call, for example web browsing traffic, would usually happen in bursts which would occupy the channel for a longer period. Contrary, attack calls would usually transfer only a small portion of data in order to trigger quick bandwidth allocations and deallocations. The two patterns are depicted on Fig. 2 with \(T^n\) denoting the normal session duration and \(T^a\) the attack session duration, and s and q respectively denoting “service” and “quiet” periods. In this part we need to estimate the average session duration \(E[T^r] = 1/\mu ^r\).
Figure 2 could be translated to a Markov Chain model as in Fig. 3, using the states: service (S), quiet (Q), and end of session (F). The transitions among S and Q states are controlled with \(\alpha ^r\), and \(\beta ^r\), where \(1/\alpha ^r\) is the average communication time of a class-r burst, and \(1/\beta ^r\) is the average duration of a quiet (inactivity) period, regarding class-r calls. The timeout rate is given with \(\tau =1/t_0\).
Let us denote with \(\varPi _i\) the probability of the session being in one of the states \(\{S,Q,F\}\). The average session duration could be found using the following ratio:
Solving the balance equations yields the state probabilities in equilibrium, and the above equation solves to:
In the above expression, one can see that when the timeout is very short, with \(\tau \rightarrow \infty \), the average session duration tends to the communication time of a single burst \(1/\alpha ^r\). Modifying the \(\alpha ^r\) and \(\beta ^r\) parameters, this modelling approach can be used to investigate different traffic types, and different attack patterns.
3 Detection and Mitigation
In this Section, we first present two real-time storm detection mechanisms based on counting channel allocations and monitoring bandwidth usage. Both are tested in the SECSIM simulator. The mitigation mechanism employs an idea of using a adjustable inactivity timer, and is tested with the model in Sect. 2.
3.1 Counter Detection
Description. The Counter detection mechanism enables detection of signalling storms per mobile terminal in real-time. It is based on counting the repetitive bandwidth allocations of same channel type (eg. a shared FACH or dedicated DCH channel in a 3G UMTS network). It is envisioned as a lightweight mechanism that should not impose any processing, storage, and memory problems if implemented on a mobile terminal.
Decision Making. The mechanism requires two input parameters: the time instances of bandwidth allocation and the type of bandwidth allocation, which are stored in memory for the duration of a time window of length \(t_w\). A decision of an attack being detected is simply taken when the number of repetitions reaches a predefined threshold called counter threshold - n. The length of the window \(t_w\) is chosen such that \(t_w > n\cdot t_{I}\), where \(t_{I}\) the duration of the inactivity timer of the attacked state. The upper limit of \(t_w\) is set according the memory and storage capacities of the device on which it is implemented.
Evaluation. Figure 4 shows the performance of the described detection algorithm using a ROC curve, as calculated with the SECSIM simulator. A threshold of \(n=3\) could be a suitable choice resulting in around 40% true positive detection \(p_{tp}\) and less than 0.2% false positive detection \(p_{fp}\).
3.2 Bandwidth Monitoring Detection
The Bandwidth monitoring detection mechanism uses a simple idea of tracking the bandwidth usage of each mobile terminal in a given sliding time window, and calculating a cost function to estimate the likelihood of a terminal performing a signalling attack. It’s based on previous analyses which showed that signalling storms are inefficient bandwidth users. The mechanism monitors two input parameters: the total time that the terminal spends while allocated bandwidth within a given time window \(t_w\) (denoted with \(t_D\), and \(t_F\) respectively for DCH and FACH states in 3G UMTs), and the time which the mobile terminal is allocated bandwidth but does not transfer any data in a time window \(t_w\) (denoted with \(t_{Di}\) and \(t_{Fi}\)). Whenever resources are de/allocated, the detector calculates the ratio \(\frac{t_{Fi}+t_{Di}}{t_{F}+t_{D}}\), which is then rolled in time using the Exponential Weighted Moving Average (EWMA) algorithm as:
where \(k\in \mathbb {N}>0\) is the index of the state change, \(0\le \alpha \le 1\) is a weight parameter and \(C[0] = \frac{t_{Fi}[0]+t_{Di}[0]}{t_{F}[0]+t_{D}[0]}\) is the initial cost value. As defined, C is between 0 and 1 with values closer to 1 indicating higher probability of an attack.
Decision Making. For decision making, we define two thresholding rules, and a rule based on the cost function. Observing the cost C, and having calculated an average \(C_{avg}\) over all historical C values, a simple rule of \(C\ge \beta C_{avg}\) can be used to detect an attack. A second rule is using an upper threshold \(\theta ^+\) above which we make a decision of an attack. This rule helps in detecting attacks with very small attack rate, for which the cost function rule cannot be used, because \(\beta C_{avg} > 1\). A second threshold is defined as lower threshold \(\theta ^-\) below which we assume a normal behaviour of the mobile terminal. The \(\theta ^-\) rule helps in protecting mobiles with normal behaviour of high activity, which are assigned a low value of \(C_{avg}\). Setting up these thresholds should be based on offline traffic analysis by the mobile operators.
Evaluation. The performance of the Bandwidth monitoring detection algorithm is depicted with the ROC curve on Fig. 4, which combines the \(p_{fp}\) and \(p_{tp}\) metrics. Values in the top-left corner of the graph are most desirable, as it produces the highest true positive and lowest false positive detection probabilities. The simulation results suggest that \(\alpha =0.3\) is the most suitable value, producing 95% true positive and 0.04% false positive detection.
3.3 Dynamic Timer Mitigation
Mobile networks today use a fixed value for the inactivity timer with possible manual corrections for specific situations, which we consider to not be the optimal approach. While it plays an important role in controlling radio resource allocation, being a trade-off parameter between the bandwidth reuse and number of connections, this section examines if it could possibly play a similar role controlling the impact of a signalling attack on the network. For this, we propose a dynamic inactivity timer which is set as a function of the network load, and use the model described in Sect. 2 to study its performance.
One possible approach is to increase the timer linearly with the load on the signalling server, after a signalling load threshold value \(\theta \) is reached:
where \(\lambda _s^{max}\) is the maximum allowed load on the signalling server, \(\theta \) is a load threshold and \(t_0^{min}\) and \(t_0^{max}\) are the minimum and maximum values that the timer can take. In real operating network, these parameters need to be estimated from statistical observations.
Results. Using the model in Sect. 2 we select a data plane model with \(m=20\) non-sharing data channels, such as in 3G UMTS Rel. 99, modelled as M/M/m/m Markov chain [35]. The rest of the parameters are selected as follows: \(\lambda _0^n=1, p_0^n=0.9, p_0^a=0.1, p_{b0}^n=0.9, p_{b0}^a=0.3\), \(\lambda _e=0.05, t_0=2\,\text {s}\) (static), \(t_0^{max}=60\,\text {s}, t_0^{min}=2\,\text {s}, \lambda _s^{max}=5\,\text {calls/s} \theta =3\,\text {calls/s}\).
Figure 5 shows the comparison of a static and dynamic inactivity timer for varying network load. The dynamic timer activates when the threshold load \(\theta \) is reached and manages to lower the resulting network load, compared to the static approach. Although the timer can play a control role, it cannot completely mitigate a signalling storm. One downside of using this approach is increasing the portion of normal calls that don’t get a service. Therefore, the timer controls the trade-off between the signalling load in the network and the number of unserviced normal calls.
4 Conclusions
This paper has briefly explained the ongoing research in the field of mobile networks security, looking at in particular, signalling related attacks. It introduced a generic mathematical model of the radio access part of a network, which can be used to model different mobile technologies, and different user patterns. The model was afterwards used to examine an attack mitigation technique using a modified inactivity timer. The two proposed attack detection mechanisms were implemented in a simulation environment and their evaluation showed satisfactory results of 95% true positive and 0.04% false positive detection. Recent work has used the Random Neural Network [13] for attack detection [2] and we expect that further results will become available with similar machine learning techniques.
References
Abdelrahman, O.H., Gelenbe, E.: Signalling storms in 3G mobile networks. In: IEEE International Conference on Communications (ICC 2014), Communication and Information Systems Security Symposium, Sydney, Australia, June 2014, pp. 1023–1028 (2014)
Abdelrahman, O.H.: Detecting network-unfriendly mobiles with the random neural network. Prob. Eng. Inf. Sci. 30, 514–531 (2016)
Baskett, F., Chandy, K.M., Muntz, R.R., Palacios, F.G.: Open, closed, and mixed networks of queues with different classes of customers. J. ACM 22, 248–260 (1975)
Brun, O., Wang, L., Gelenbe, E.: Big data for autonomic intercontinental communications. IEEE Trans. Sel. Areas Commun. 34(3), 575–583 (2016)
Choi, Y., Yoon, C., Kim, Y.S., Heo, S.W., Silvester, J.A.: The impact of application signaling traffic on public land mobile networks. IEEE Commun. Mag. 52, 166–172 (2014)
Collen, A., et al.: Ghost - safe-guarding home IoT environments with personalised real-time risk control. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 68–78. Springer, Cham (2018)
Cramer, C.E., Gelenbe, E.: Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun. 18, 150–167 (2000)
Delosières, L., Sánchez, A.: DroidCollector: a honeyclient for collecting and classifying android applications. In: Czachórski, T., Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2014, pp. 175–183. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09465-6_19
Domanka, J., Gelenbe, E., Czachorski, T., Drosou, A., Tzovaras, D.: Research and innovation action for the security of the Internet of Things: the SerIoT project. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. CCIS, vol. 821, pp. 101–118. Springer, Cham (2018)
Francois, F., Abdelrahman, O.H., Gelenbe, E.: Impact of signaling storms on energy consumption and latency of LTE user equipment. In: Proceedings of the 7th IEEE International Symposium on Cyberspace safety and security (CSS 2015), New York, August 2015
Francois, F., Abdelrahman, O.H., Gelenbe, E.: Feasibility of signaling storms in 3G/UMTS operational networks. In: Mandler, B., et al. (eds.) IoT360 2015. LNICST, vol. 169, pp. 187–198. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47063-4_17
Francois, F., Abdelrahman, O.H., Gelenbe, E.: Towards assessment of energy consumption and latency of LTE UEs during signaling storms. In: Abdelrahman, O.H., Gelenbe, E., Gorbil, G., Lent, R. (eds.) Information Sciences and Systems 2015. LNEE, vol. 363, pp. 45–55. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-22635-4_4
Gelenbe, E.: Reseaux neuronaux aleatoires stables. Comptes Rendus de l’Academie des Sciences Serie 2 310(3), 177–180 (1990)
Gelenbe, E.: Probabilistic models of computer systems. Acta Informatica 12(4), 285–303 (1979)
Gelenbe, E.: Product-form queueing networks with negative and positive customers. J. Appl. Prob. 28, 656–663 (1991)
Gelenbe, E.: Dealing with software viruses: a biological paradigm. Inf. Secur. Tech. Rep. 12, 242–250 (2007)
Gelenbe, E.: A diffusion model for packet travel time in a random multi-hop medium. ACM Trans. Sens. Netw. (TOSN) 3, 10 (2007)
Gelenbe, E.: Self-aware networks. In: 2011 Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), pp. 227–234. IEEE (2011)
Gelenbe, E., Abdelrahman, O.H.: Countering mobile signaling storms with counters. In: Mandler, B., et al. (eds.) IoT360 2015. LNICST, vol. 169, pp. 199–209. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47063-4_18
Gelenbe, E., Abdelrahman, O.H., Gorbil, G.: Detection and mitigation of signaling storms in mobile networks. In: 2016 International Conference on Computing, Networking and Communications (ICNC), pp. 1–5. IEEE (2016)
Gelenbe, E., Loukas, G.: A self-aware approach to Denial of service defence. Comput. Netw. 51, 1299–1314 (2007)
Gelenbe, E., Mitrani, I.: Analysis and Synthesis of Computer Systems, vol. 4. World Scientific, Singapore (2010)
Gelenbe, E., Muntz, R.R.: Probabilistic models of computer systems-part I (exact results). Acta Informatica 7(1), 35–60 (1976)
Gelenbe, E., Pujolle, G.: Introduction aux Réseaux de Files d’Attente. Edition Hommes et Techniques, Eyrolles (1982)
Gorbil, G., Gelenbe, E.: Opportunistic communications for emergency support systems. Procedia Comput. Sci. 5, 39–47 (2011)
Gorbil, G., Abdelrahman, O.H., Gelenbe, E.: Storms in mobile networks. In: Proceedings of the 9th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2014), pp. 119–126, September 2014
Gorbil, G., Abdelrahman, O.H., Pavloski, M., Gelenbe, E.: Modeling and analysis of RRC-based signaling storms in 3G networks. IEEE Trans. Emerg. Top. Comput. 4, 1–14 (2015). Special Issue on Emerging Topics in Cyber Security
Gupta, A., Verma, T., Bali, S., Kaul, S.: Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks. In: 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–60, January 2013
Jackson, J.R.: Jobshop-like queueing systems. Manag. Sci. 10, 131–142 (1963)
Kambourakis, G., Kolias, C., Gritzalis, S., Park, J.H.: Dos attacks exploiting signaling in UMTS and IMS. Comput. Commun. 34, 226–235 (2011)
Kotapati, K., Liu, P., Sun, Y., LaPorta, T.F.: A taxonomy of cyber attacks on 3G networks. In: Kantor, P., et al. (eds.) ISI 2005. LNCS, vol. 3495, pp. 631–633. Springer, Heidelberg (2005). https://doi.org/10.1007/11427995_82
Lee, P.P.C., Bu, T., Woo, T.: On the detection of signaling DoS attacks on 3G wireless networks. In: Proceedings - IEEE INFOCOM, pp. 1289–1297 (2007)
Loukas, G., Oke, G., Gelenbe, E., et al.: Defending against Denial of service in a self-aware network: a practical approach. In: NATO Symposium on Information Assurance for Emerging and Future Military Systems. Ljubljana, Slovenia (2008)
Mulliner, C., Liebergeld, S., Lange, M., Seifert, J.P.: Taming Mr Hayes: mitigating signaling based attacks on smartphones. In: Proceedings of the International Conference on Dependable Systems and Networks (2012)
Pavloski, M.: A performance approach to mobile security. In: 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 325–330, September 2016
Pavloski, M.: Performance analysis of mobile networks under signalling storms. Ph.D. thesis, Imperial College London (2017)
Pavloski, M., Gelenbe, E.: Signaling attacks in mobile telephony. In: Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT 2014), pp. 206–212, August 2014
Pavloski, M., Görbil, G., Gelenbe, E.: Counter based detection and mitigation of signalling attacks. In: Obaidat, M.S., Lorenz, P., Samarati, P. (eds.) SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20–22 July, 2015, pp. 413–418. SciTePress (2015)
Pavloski, M., Görbil, G., Gelenbe, E.: Bandwidth usage—based detection of signaling attacks. In: Abdelrahman, O.H., Gelenbe, E., Gorbil, G., Lent, R. (eds.) Information Sciences and Systems 2015. LNEE, vol. 363, pp. 105–114. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-22635-4_9
Qian, F., Wang, Z., Gerber, A., Mao, Z.M., Sen, S., Spatscheck, O.: Characterizing radio resource allocation for 3G networks. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, IMC 2010, pp. 137–150. ACM, New York(2010)
Ricciato, F., Coluccia, A., D’Alconzo, A.: A review of DoS attack models for 3G cellular networks from a system-design perspective. Comput. Commun. 33, 551–558 (2010)
Wang, H., Zhang, D., Shin, K.G.: Change-point monitoring for the detection of DoS attacks. IEEE Trans. Dependable Secur. Comput. 1, 193–208 (2004)
Wang, L., Brun, O., Gelenbe, E.: Adaptive workload distribution for local and remote clouds. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 003984–003988. IEEE (2016)
Wang, L., Gelenbe, E.: Adaptive dispatching of tasks in the cloud. IEEE Trans. Cloud Comput. 6(1), 33–45 (2018)
Wu, Z., Zhou, X., Yang, F.: Defending against DoS attacks on 3G cellular networks via randomization method. In: 2010 International Conference on Educational and Information Technology (ICEIT), pp. V1-504–V1-508 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
<SimplePara><Emphasis Type="Bold">Open Access</Emphasis> This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.</SimplePara> <SimplePara>The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.</SimplePara>
Copyright information
© 2018 The Author(s)
About this paper
Cite this paper
Pavloski, M. (2018). Signalling Attacks in Mobile Telephony. In: Gelenbe, E., et al. Security in Computer and Information Sciences. Euro-CYBERSEC 2018. Communications in Computer and Information Science, vol 821. Springer, Cham. https://doi.org/10.1007/978-3-319-95189-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-95189-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-95188-1
Online ISBN: 978-3-319-95189-8
eBook Packages: Computer ScienceComputer Science (R0)