-
1
-
-
0003948271
-
Your 802.11 wireless network has no clothes
-
Suntec City, Singapore, December
-
W.A. Arbaugh, N. Shankar, J. Wang and K. Zhang, "Your 802.11 wireless network has no clothes," in First IEEE International Conference on Wireless LANs and Home Networks, Suntec City, Singapore, December 2001
-
(2001)
First IEEE International Conference on Wireless LANs and Home Networks
-
-
Arbaugh, W.A.1
Shankar, N.2
Wang, J.3
Zhang, K.4
-
2
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," Lecture Notes in Computer Science, vol.2259, pp. 1-24, 2001
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
3
-
-
0038065918
-
-
[Website], [cited 2004 Jun]
-
N. Borisov, I. Goldberg, and D. Wagner, "Security of WEP algorithm," [Website], [cited 2004 Jun], Available HTTP: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
-
Security of WEP Algorithm
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
4
-
-
0037003792
-
Denial of service attacks at the MAC layer in wireless an hoc networks
-
Anaheim, CA, October
-
V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of service attacks at the MAC layer in wireless an hoc networks," in Proceedings of 2002 MILCOM Conference, Anaheim, CA, October 2002
-
(2002)
Proceedings of 2002 MILCOM Conference
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
5
-
-
79955055383
-
Protecting wireless networks against a denial of service attact based on virtual jamming
-
San Diego, California, USA, September
-
D. Chen, J. Deng, and P.K. Varshney, "Protecting wireless networks against a denial of service attact based on virtual jamming," in ACM MobiCom 2003, San Diego, California, USA, September 2003
-
(2003)
ACM MobiCom 2003
-
-
Chen, D.1
Deng, J.2
Varshney, P.K.3
-
7
-
-
84946397365
-
Wireless intrusion detection and response
-
West Point, NY, USA, June
-
Y.X. Lim, T. Schmoyer, J. Levine, and H.L. Owen, "Wireless intrusion detection and response," in Proceedings of the 2003 IEEE Workshop on Information Assurance, US Military Academy, West Point, NY, USA, June 2003 pp.68-75
-
(2003)
Proceedings of the 2003 IEEE Workshop on Information Assurance, US Military Academy
, pp. 68-75
-
-
Lim, Y.X.1
Schmoyer, T.2
Levine, J.3
Owen, H.L.4
-
8
-
-
1542360013
-
Detection and handling of MAC layer misbehavior in wireless networks
-
San Francisco, California, USA, June
-
P. Kyasanur and N. Vaidya, "Detection and handling of MAC layer misbehavior in wireless networks," in 2003 International Conference on Dependable Systems and Networks, San Francisco, California, USA, June 2003 pp. 173-182
-
(2003)
2003 International Conference on Dependable Systems and Networks
, pp. 173-182
-
-
Kyasanur, P.1
Vaidya, N.2
-
9
-
-
0034546898
-
Intrusion detection in wireless ad hoc networks
-
Y.G Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Mobile Computing and Networking, pp.275-283, 2000
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.G.1
Lee, W.2
-
10
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y.G. Zhang, W. Lee, and Y.A. Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol.9, pp.545-556, 2003
-
(2003)
Wireless Networks
, vol.9
, pp. 545-556
-
-
Zhang, Y.G.1
Lee, W.2
Huang, Y.A.3
-
11
-
-
0344081939
-
Rival penalized competitive learning (RPCL): A topology-determining algorithm for analyzing gene expression data
-
T.M. Nair, C.L. Zheng, and J.L. Fink, "Rival penalized competitive learning (RPCL): a topology-determining algorithm for analyzing gene expression data," Computational Biology and Chemistry, vol. 27, pp.565-574, 2003
-
(2003)
Computational Biology and Chemistry
, vol.27
, pp. 565-574
-
-
Nair, T.M.1
Zheng, C.L.2
Fink, J.L.3
-
12
-
-
33845588681
-
Local PCA for line detection and thinning
-
Z.Y. Liu, K.C. Chiu, and L. Xu, "Local PCA for line detection and thinning," Lecture Notes in Computer Science, vol.2683, pp.21-34, 2003
-
(2003)
Lecture Notes in Computer Science
, vol.2683
, pp. 21-34
-
-
Liu, Z.Y.1
Chiu, K.C.2
Xu, L.3
-
13
-
-
33845598350
-
A competitive neural network based on dipoles
-
M.A. Garcia-Bernal, J. Munoz-perez, J.A. Gomez-Ruiz, and I. Ladron de Guevara-lopez, "A competitive neural network based on dipoles," Lecture Notes in Computer Science, vol.2686, pp.398405, 2003
-
(2003)
Lecture Notes in Computer Science
, vol.2686
, pp. 398405
-
-
Garcia-Bernal, M.A.1
Munoz-Perez, J.2
Gomez-Ruiz, J.A.3
Ladron De Guevara-Lopez, I.4
-
14
-
-
33750129144
-
Analyses on the generalized lotto-type competitive learning
-
L. Andrew, "Analyses on the generalized lotto-type competitive learning," Lecture Notes in Computer Science, vol.1983, pp.9-16, 2000
-
(2000)
Lecture Notes in Computer Science
, vol.1983
, pp. 9-16
-
-
Andrew, L.1
|