메뉴 건너뛰기




Volumn 213, Issue , 2006, Pages 55-64

A sliding window based Management Traffic Clustering Algorithm for 802.11 WLAN intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; MERCURY (METAL); NETWORK SECURITY; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 33846676697     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-34827-8_5     Document Type: Article
Times cited : (4)

References (10)
  • 3
    • 33645849314 scopus 로고    scopus 로고
    • "Weakness in Passphrase Choice in WPA Interface"
    • November
    • R.Moskowitz, "Weakness in Passphrase Choice in WPA Interface", http://wifinetnews.com/archives/002452.html, November, 2003
    • (2003)
    • Moskowitz, R.1
  • 4
    • 33846691540 scopus 로고    scopus 로고
    • IEEE 802.11i specification
    • IEEE 802.11i specification. http://standards.ieee.org/getieee802/ download/802.11i-2004.pdf
  • 5
    • 85032201913 scopus 로고    scopus 로고
    • "Wireless Hacking: Breaking Through"
    • December
    • A.Mikhailovsky, K.Gavrilenko and A.Vladimirov, "Wireless Hacking: Breaking Through", December 2004, http://www.awprofessional.com/ articles/article.asp?p=353735&seqNum=8&rl=1
    • (2004)
    • Mikhailovsky, A.1    Gavrilenko, K.2    Vladimirov, A.3
  • 6
    • 33846655723 scopus 로고    scopus 로고
    • "A Novel Classification Scheme 802.11 WLAN Active Attacking Traffic Patterns"
    • Las Vegas, US
    • W.Zhou, A.Marshall and Q.Gu, "A Novel Classification Scheme 802.11 WLAN Active Attacking Traffic Patterns", Las Vegas, US, WCNC 2006.
    • (2006) WCNC
    • Zhou, W.1    Marshall, A.2    Gu, Q.3
  • 7
    • 33846701974 scopus 로고    scopus 로고
    • IEEE 802.11-1999 specification
    • IEEE 802.11-1999 specification. http://standards.ieee.org/getieee802/ download/802.11-1999.pdf
  • 9
    • 19944364877 scopus 로고    scopus 로고
    • "Feature deduction and ensemble design of intrusion detection systems"
    • June
    • S.Chebrolu, A.Abraham, and J.P.Thomas, "Feature deduction and ensemble design of intrusion detection systems". Computers & Security, Volume 24, Issue 4, June 2005.
    • (2005) Computers & Security , vol.24 , Issue.4
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.