메뉴 건너뛰기




Volumn 3905 LNCS, Issue , 2006, Pages 1-12

802.11 de-authentication attack detection using genetic programming

Author keywords

[No Author keywords available]

Indexed keywords

DEMODULATION; FUNCTION EVALUATION; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA; SET THEORY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33745745418     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11729976_1     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 2
    • 0344666724 scopus 로고    scopus 로고
    • A comparative study of techniques for intrusion detection, 15th ieee international conference on tools with artificial intelligence
    • Mukkamala, S. Sung, A.: A comparative study of techniques for intrusion detection, 15th ieee international conference on tools with artificial intelligence. 15th IEEE International Conference on Tools with Artificial Intelligence - ICTAI (2003) 570 - 577
    • (2003) 15th IEEE International Conference on Tools with Artificial Intelligence - ICTAI , pp. 570-577
    • Mukkamala, S.1    Sung, A.2
  • 7
    • 21044433766 scopus 로고    scopus 로고
    • Training genetic programming on half a million patterns: An example from anomaly detection
    • Song, D., Heywood, M.I., Zincir-Heywood, A.N.: Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Transactions on Evolutionary Computation 9(3) (2005) 225-239
    • (2005) IEEE Transactions on Evolutionary Computation , vol.9 , Issue.3 , pp. 225-239
    • Song, D.1    Heywood, M.I.2    Zincir-Heywood, A.N.3
  • 8
    • 67650418236 scopus 로고    scopus 로고
    • Detecting new forms of network intrusion using genetic programming
    • Sarker, R., Reynolds, R., Abbass, H., Tan, K.C., McKay, B., Essam, D., Gedeon, T., eds., Canberra, IEEE Press
    • Lu, W., Traore, I.: Detecting new forms of network intrusion using genetic programming. In Sarker, R., Reynolds, R., Abbass, H., Tan, K.C., McKay, B., Essam, D., Gedeon, T., eds.: Proceedings of the 2003 Congress on Evolutionary Computation CEC2003, Canberra, IEEE Press (2003) 2165-2172
    • (2003) Proceedings of the 2003 Congress on Evolutionary Computation CEC2003 , pp. 2165-2172
    • Lu, W.1    Traore, I.2
  • 9
    • 74949104861 scopus 로고
    • Applying genetic programming to intrusion detection
    • Siegel, E.V., Koza, J.R., eds., MIT, Cambridge, MA, USA, AAAI
    • Crosbie, M., Spafford, E.H.: Applying genetic programming to intrusion detection. In Siegel, E.V., Koza, J.R., eds.: Working Notes for the AAAI Symposium on Genetic Programming, MIT, Cambridge, MA, USA, AAAI (1995) 1-8
    • (1995) Working Notes for the AAAI Symposium on Genetic Programming , pp. 1-8
    • Crosbie, M.1    Spafford, E.H.2
  • 10
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: USENIX Security Symposium. (2003) 15-28
    • (2003) USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 11
    • 0003697989 scopus 로고    scopus 로고
    • (R2003). IEEE, New York, NY, USA
    • IEEE-SA Standards Board: ANSI/IEEE Std 802.11, 1999 Edition (R2003). IEEE, New York, NY, USA (1999)
    • (1999) ANSI/IEEE Std 802.11, 1999 Edition
  • 14
    • 33745736185 scopus 로고    scopus 로고
    • Kismet
    • Kershaw, M.: Kismet http://www.kismetwireless.net/ (2005)
    • (2005)
    • Kershaw, M.1
  • 15
    • 4544317724 scopus 로고    scopus 로고
    • Wireless intrusion detection and response: A case study using the classic man-in-the-middle attack
    • Atlanta Ga
    • Schmoyer, T., Lim, Y.X., Owen, H.: Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack. In: IEEE Wireless Communications and Networking Conference, Atlanta Ga. (2004)
    • (2004) IEEE Wireless Communications and Networking Conference
    • Schmoyer, T.1    Lim, Y.X.2    Owen, H.3
  • 17
    • 85008255983 scopus 로고
    • Dynamic training subset selection for supervised learning in genetic programming
    • Davidor, Y., Schwefel, H.P., Männer, R., eds.: Parallel Problem Solving from Nature III. Jerusalem, Springer-Verlag
    • Gathercole, C., Ross, P.: Dynamic training subset selection for supervised learning in genetic programming. In Davidor, Y., Schwefel, H.P., Männer, R., eds.: Parallel Problem Solving from Nature III. Volume 866 of LNCS., Jerusalem, Springer-Verlag (1994) 312-321
    • (1994) LNCS , vol.866 , pp. 312-321
    • Gathercole, C.1    Ross, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.