{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T20:32:28Z","timestamp":1724963548808},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,16]]},"DOI":"10.1145\/2382196.2382220","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Mobile data charging"],"prefix":"10.1145","author":[{"given":"Chunyi","family":"Peng","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Chi-yu","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Guan-Hua","family":"Tu","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Lixia","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AndFTP - LYSESOFT v2.9.8. http:\/\/www.lysesoft.com. AndFTP - LYSESOFT v2.9.8. http:\/\/www.lysesoft.com."},{"key":"e_1_3_2_1_2_1","unstructured":"DNSSEC. http:\/\/www.dnssec.net\/. DNSSEC. http:\/\/www.dnssec.net\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Fast and Free Facebook Mobile Access with 0.facebook.com. https:\/\/www.facebook.com\/blog\/blog.php?post=391295167130. Fast and Free Facebook Mobile Access with 0.facebook.com. https:\/\/www.facebook.com\/blog\/blog.php?post=391295167130."},{"key":"e_1_3_2_1_4_1","unstructured":"Free Fast Public DNS Servers List. http:\/\/theos.in\/windows-xp\/free-fast-public-dns-server-list\/. Free Fast Public DNS Servers List. http:\/\/theos.in\/windows-xp\/free-fast-public-dns-server-list\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Free Gprs Mobile Tricks. http:\/\/darkwap.mobi\/gprs-tricks\/Free-Gprs-Mobile-Tricks. Free Gprs Mobile Tricks. http:\/\/darkwap.mobi\/gprs-tricks\/Free-Gprs-Mobile-Tricks."},{"key":"e_1_3_2_1_6_1","unstructured":"FreeProxy v4.1. http:\/\/www.handcraftedsoftware.org\/. FreeProxy v4.1. http:\/\/www.handcraftedsoftware.org\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Iodine. http:\/\/code.kryo.se\/iodine\/. Iodine. http:\/\/code.kryo.se\/iodine\/."},{"key":"e_1_3_2_1_8_1","unstructured":"IP Tunneling Through Nameservers. http:\/\/slashdot.org\/story\/00\/09\/10\/2230242\/ip-tunneling-throughnameservers. IP Tunneling Through Nameservers. http:\/\/slashdot.org\/story\/00\/09\/10\/2230242\/ip-tunneling-throughnameservers."},{"key":"e_1_3_2_1_9_1","unstructured":"MobileMe. http:\/\/www.apple.com\/mobileme\/. MobileMe. http:\/\/www.apple.com\/mobileme\/."},{"key":"e_1_3_2_1_10_1","unstructured":"NSTX. http:\/\/thomer.com\/howtos\/nstx.html. NSTX. http:\/\/thomer.com\/howtos\/nstx.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Opera Mobile v12.0.0. http:\/\/www.opera.com\/mobile\/. Opera Mobile v12.0.0. http:\/\/www.opera.com\/mobile\/."},{"key":"e_1_3_2_1_12_1","unstructured":"ProxyDroid v2.6.1. https:\/\/play.google.com\/store\/apps\/details?id=org.proxydroid. ProxyDroid v2.6.1. https:\/\/play.google.com\/store\/apps\/details?id=org.proxydroid."},{"key":"e_1_3_2_1_13_1","unstructured":"Skype. http:\/\/www.skype.com. Skype. http:\/\/www.skype.com."},{"key":"e_1_3_2_1_14_1","unstructured":"TrafficStats. http:\/\/developer.android.com. TrafficStats. http:\/\/developer.android.com."},{"key":"e_1_3_2_1_15_1","volume-title":"GPRS","author":"GPP.","year":"2006","unstructured":"3 GPP. TS23.060 : GPRS ; Service description; Stage 2, Dec. 2006 . 3GPP. TS23.060: GPRS; Service description; Stage 2, Dec. 2006."},{"key":"e_1_3_2_1_16_1","volume-title":"Mar","author":"GPP.","year":"2006","unstructured":"3 GPP. TS23.125 : Overall High Level Functionality and Architecture Impacts of Flow Based Charging , Mar 2006 . 3GPP. TS23.125: Overall High Level Functionality and Architecture Impacts of Flow Based Charging, Mar 2006."},{"key":"e_1_3_2_1_17_1","unstructured":"3GPP. TS32.240:Telecommunication management; Charging management; Charging architecture and principles Sep. 2006. 3GPP. TS32.240:Telecommunication management; Charging management; Charging architecture and principles Sep. 2006."},{"key":"e_1_3_2_1_18_1","volume-title":"Radio Interface Protocol Architecture","author":"GPP.","year":"2008","unstructured":"3 GPP. TS25.301 : Radio Interface Protocol Architecture , 2008 . 3GPP. TS25.301: Radio Interface Protocol Architecture, 2008."},{"key":"e_1_3_2_1_19_1","volume-title":"Global 3G Deployments UMTS HSPA HSPA+","author":"America G.","year":"2010","unstructured":"G. America . Global 3G Deployments UMTS HSPA HSPA+ , 2010 . G. America. Global 3G Deployments UMTS HSPA HSPA+, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247690"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102171"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593280"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_3_2_1_24_1","volume-title":"ACM HotNets-III","author":"Guo C.","year":"2004","unstructured":"C. Guo , H. Wang , and W. Zhu . Smartphone attacks and defenses . In ACM HotNets-III , 2004 . C. Guo, H. Wang, and W. Zhu. Smartphone attacks and defenses. In ACM HotNets-III, 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028649"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.134"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.008"},{"key":"e_1_3_2_1_28_1","volume-title":"Global Mobile Statistics","year":"2012","unstructured":"mobiThinking. Global Mobile Statistics 2012 . http:\/\/mobithinking.com\/mobile-marketing-tools\/latest-mobile-stats. mobiThinking. Global Mobile Statistics 2012. http:\/\/mobithinking.com\/mobile-marketing-tools\/latest-mobile-stats."},{"key":"e_1_3_2_1_29_1","unstructured":"OECD. Nearly Two-Thirds of US Broadband Subscribers are Wireless. http:\/\/www.websiteoptimization.com\/bw\/1012\/. OECD. Nearly Two-Thirds of US Broadband Subscribers are Wireless. http:\/\/www.websiteoptimization.com\/bw\/1012\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348560"},{"key":"e_1_3_2_1_31_1","volume-title":"Real Time Streaming Protocol (RTSP)","year":"1998","unstructured":"RFC2326 : Real Time Streaming Protocol (RTSP) , 1998 . RFC2326: Real Time Streaming Protocol (RTSP), 1998."},{"key":"e_1_3_2_1_32_1","volume-title":"DNS Transport over TCP - Implementation Requirements","year":"2010","unstructured":"RFC5966 : DNS Transport over TCP - Implementation Requirements , 2010 . RFC5966: DNS Transport over TCP - Implementation Requirements, 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPERU.2006.13"},{"key":"e_1_3_2_1_34_1","volume-title":"Current Plans, and Future Trends. CoRR, abs\/1201.4197","author":"Sen S.","year":"2012","unstructured":"S. Sen , C. Joe-Wong , S. Ha , and M. Chiang . Pricing Data: A Look at Past Proposals , Current Plans, and Future Trends. CoRR, abs\/1201.4197 , 2012 . S. Sen, C. Joe-Wong, S. Ha, and M. Chiang. Pricing Data: A Look at Past Proposals, Current Plans, and Future Trends. CoRR, abs\/1201.4197, 2012."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"e_1_3_2_1_36_1","volume-title":"Secure Application Development","author":"Wallach D. S.","year":"2011","unstructured":"D. S. Wallach . Smartphone security: Trends and predictions . In Secure Application Development , SecAppDev , 2011 . D. S. Wallach. Smartphone security: Trends and predictions. In Secure Application Development, SecAppDev, 2011."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018479"},{"key":"e_1_3_2_1_38_1","unstructured":"WireShark. http:\/\/www.wireshark.org\/. WireShark. http:\/\/www.wireshark.org\/."}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","location":"Raleigh North Carolina USA","acronym":"CCS'12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2012 ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2382196.2382220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T23:33:22Z","timestamp":1673480002000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382220"}},"subtitle":["new attacks and countermeasures"],"short-title":[],"issued":{"date-parts":[[2012,10,16]]},"references-count":38,"alternative-id":["10.1145\/2382196.2382220","10.1145\/2382196"],"URL":"http:\/\/dx.doi.org\/10.1145\/2382196.2382220","relation":{},"subject":[],"published":{"date-parts":[[2012,10,16]]},"assertion":[{"value":"2012-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}