-
2
-
-
6344233247
-
Extensible authentication protocol (EAP)
-
June
-
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz. Extensible authentication protocol (EAP). The Internet Engineering Task Force - Request for Comments: 3748, June 2004.
-
(2004)
The Internet Engineering Task Force - Request for Comments: 3748
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
4
-
-
3042592883
-
Physically locating wireless intruders
-
Frank Adelstein, Prasanth Alia, Rob Joyce, and Golden G. Richard III. Physically locating wireless intruders, In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), pages 482-489, 2004.
-
(2004)
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)
, pp. 482-489
-
-
Adelstein, F.1
Alia, P.2
Joyce, R.3
Richard III, G.G.4
-
7
-
-
0035388827
-
Characteristics of radio transmitter fingerprints
-
K.J. Ellis and N. Serinken. Characteristics of radio transmitter fingerprints. Radio Science, 36:585-597, 2001.
-
(2001)
Radio Science
, vol.36
, pp. 585-597
-
-
Ellis, K.J.1
Serinken, N.2
-
8
-
-
32144461283
-
Telecommunications and internet protocol harmonization over networks TIPHON release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis
-
ETSI. Telecommunications and internet protocol harmonization over networks TIPHON release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis. Technical Specification ETSI TS 102 165-1 V4.1.1, 2003.
-
(2003)
Technical Specification ETSI TS 102 165-1 V4.1.1
-
-
-
11
-
-
1542747838
-
Detection of transient in radio frequency fingerprinting using signal phase
-
Banff, Canada, July. ACTA Press
-
J. Hall, M. Barbeau, and E. Kranakis. Detection of Transient in Radio Frequency Fingerprinting using Signal Phase. In proceedings of the 3rd IASTED International Conference on Wireless and Optical Communications (WOC 2005), pages 13-18, Banff, Canada, July 2003. ACTA Press.
-
(2003)
Proceedings of the 3rd IASTED International Conference on Wireless and Optical Communications (WOC 2005)
, pp. 13-18
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
12
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
-
St. Thomas, U.S. Virgin Islands, November
-
J. Hall, M. Barbeau, and E. Kranakis. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CUT), pages 201-206, St. Thomas, U.S. Virgin Islands, November 2004.
-
(2004)
Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology (CUT)
, pp. 201-206
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
13
-
-
84941161226
-
Using mobility profiles for anomaly-based intrusion detection in mobile networks
-
Montreal, Canada, August 2005. Preliminary version in NDSS'05 Preconference Workshop on Wireless and Mobile Security
-
J. Hall, M. Barbeau, and E. Kranakis. Using mobility profiles for anomaly-based intrusion detection in mobile networks. In Proceedings of the Wireless and Mobile Computing, Networking and Communications, pages 22-24, Montreal, Canada, August 2005. Preliminary version in NDSS'05 Preconference Workshop on Wireless and Mobile Security.
-
Proceedings of the Wireless and Mobile Computing, Networking and Communications
, pp. 22-24
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
15
-
-
0034336489
-
Feature selection using probabilistic neural networks
-
Andrew Hunter. Feature selection using probabilistic neural networks. Neural Computing and Applications, 9:124-132, 2000.
-
(2000)
Neural Computing and Applications
, vol.9
, pp. 124-132
-
-
Hunter, A.1
-
16
-
-
84941157461
-
-
Accessed in February 2004
-
AirDefense Inc. http://www.airdefense.net. Accessed in February 2004.
-
-
-
-
17
-
-
33749030067
-
Financial times information
-
March
-
Financial Times Information. Mobile cloning, March 2005.
-
(2005)
Mobile Cloning
-
-
-
19
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
August
-
Terran Lane and Carla E. Brodley, Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security, 2(3):295-331, August 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
21
-
-
0000501025
-
Evaluation of location area planning scenarios in future mobile telecommunication systems
-
J. Markoulidakis, G. Lyberopoulos, D. Tsirkas, and E. Sykas. Evaluation of location area planning scenarios in future mobile telecommunication systems. Wireless Networks, 1, 1995.
-
(1995)
Wireless Networks
, pp. 1
-
-
Markoulidakis, J.1
Lyberopoulos, G.2
Tsirkas, D.3
Sykas, E.4
-
22
-
-
84941161525
-
-
Accessed in February 2004
-
Netstumbler. http://www.netstumbler.org. Accessed in February 2004.
-
-
-
-
23
-
-
77955321219
-
Local and metropolitan area networks - Part 16: Air interface for fixed broadband wireless access systems - amendment for physical and medium access control layers for combined fixed and mobile operation in licensed bands
-
IEEE P802.16e/D8-2005, May
-
LAN MAN Standards Committee of the IEEE Computer Society, the IEEE Microwave Theory, and Techniques Society. Local and metropolitan area networks - part 16: Air interface for fixed broadband wireless access systems - amendment for physical and medium access control layers for combined fixed and mobile operation in licensed bands. Draft IEEE Standard, IEEE P802.16e/D8-2005, May 2005.
-
(2005)
Draft IEEE Standard
-
-
-
24
-
-
1542487484
-
Cellular security: Better, but foes still lurk
-
June
-
Michael J. Riezenman. Cellular security: better, but foes still lurk. IEEE Spectrum, pages 39-42, June 2000.
-
(2000)
IEEE Spectrum
, pp. 39-42
-
-
Riezenman, M.J.1
-
26
-
-
0031234827
-
IDAMN: An intrusion detection architecture for mobile networks
-
Sept.
-
D. Samfat and R. Molva. IDAMN: an intrusion detection architecture for mobile networks. IEEE Journal on Selected Areas in Communications, 15(7):1373-1380, Sept. 1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.7
, pp. 1373-1380
-
-
Samfat, D.1
Molva, R.2
-
27
-
-
16244402347
-
Bayesian detection of Wi-Fi transmitter RF finger-prints
-
March
-
N. Serinken and O. Ureten. Bayesian detection of Wi-Fi transmitter RF finger-prints. Electronic Letters, 41(6):373-374, March 2005.
-
(2005)
Electronic Letters
, vol.41
, Issue.6
, pp. 373-374
-
-
Serinken, N.1
Ureten, O.2
-
28
-
-
0031359229
-
Multifractal modelling of radio transmitter transients for classification
-
Winnipeg Manitoba, May. IEEE
-
D. Shaw and W. Kinsner. Multifractal modelling of radio transmitter transients for classification. In Communications Power and Computing, pages 306-312, Winnipeg Manitoba, May 1997. IEEE.
-
(1997)
Communications Power and Computing
, pp. 306-312
-
-
Shaw, D.1
Kinsner, W.2
-
31
-
-
27544449081
-
Use of an artificial neural network to detect anomalies in wireless device location for the purpose of intrusion detection
-
SoutheastCon, April
-
Jared Spencer. Use of an artificial neural network to detect anomalies in wireless device location for the purpose of intrusion detection. In Proceedings of the IEEE, pages 686-691, SoutheastCon, April 2005.
-
(2005)
Proceedings of the IEEE
, pp. 686-691
-
-
Spencer, J.1
-
32
-
-
11244286137
-
Mobility-based anomaly detection in cellular mobile networks
-
Philadelphia, Pennsylvania, USA
-
B. Sun and F. Yu. Mobility-based anomaly detection in cellular mobile networks. In International Conference on WiSe 04, pages 61-69, Philadelphia, Pennsylvania, USA, 2004.
-
(2004)
International Conference on WiSe 04
, pp. 61-69
-
-
Sun, B.1
Yu, F.2
-
33
-
-
1242298616
-
Improvement of transmitter identification system for low SNR transients
-
February
-
O.K. Tekbas, O. Ureten, and N. Serinken. Improvement of transmitter identification system for low SNR transients. Electronic Letters, 40(3):182-183, February 2004.
-
(2004)
Electronic Letters
, vol.40
, Issue.3
, pp. 182-183
-
-
Tekbas, O.K.1
Ureten, O.2
Serinken, N.3
-
34
-
-
0029461389
-
Transient analysis and genetic algorithms for classification
-
IEEE
-
J. Toonstra and W. Kinsner. Transient analysis and genetic algorithms for classification. In WESCAN. IEEE, 1995.
-
(1995)
WESCAN
-
-
Toonstra, J.1
Kinsner, W.2
-
35
-
-
0033326545
-
Detection of radio transmitter turn-on transients
-
Oktay Ureten and Nur Serinken. Detection of radio transmitter turn-on transients. Electronic Letters, 35:1996-1997, 1999.
-
(1999)
Electronic Letters
, vol.35
, pp. 1996-1997
-
-
Ureten, O.1
Serinken, N.2
-
36
-
-
0034271986
-
Location management for next generation personal communications networks
-
Sept.
-
V. Wong and V. Leung. Location management for next generation personal communications networks. IEEE Network, pages 18-24, Sept. 2000.
-
(2000)
IEEE Network
, pp. 18-24
-
-
Wong, V.1
Leung, V.2
-
37
-
-
0035208987
-
Profile-based protocols in wireless mobile ad hoc networks
-
K. Wu, J. Harms, and E.S. Elmallah. Profile-based protocols in wireless mobile ad hoc networks. Local Computer Networks, pages 568-575, 2001.
-
(2001)
Local Computer Networks
, pp. 568-575
-
-
Wu, K.1
Harms, J.2
Elmallah, E.S.3
|