-
1
-
-
0003948271
-
Your 802.11 wireless network has no clothes
-
Suntec City, Singapore, December
-
W.A. Arbaugh, N. Shankar, J. Wang and K. Zhang, "Your 802.11 wireless network has no clothes," in First IEEE International Conference on Wireless LANs and Home Networks, Suntec City, Singapore, December 2001
-
(2001)
First IEEE International Conference on Wireless LANs and Home Networks
-
-
Arbaugh, W.A.1
Shankar, N.2
Wang, J.3
Zhang, K.4
-
2
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," Lecture Notes in Computer Science, vol.2259, pp. 1-24, 2001
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
3
-
-
0038065918
-
-
Website, cited Jun, Available, http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
-
N. Borisov, I. Goldberg, and D. Wagner, "Security of WEP algorithm," [Website], [cited 2004 Jun], Available HTTP: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
-
(2004)
Security of WEP algorithm
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
4
-
-
0037003792
-
Denial of service attacks at the MAC layer in wireless an hoc networks
-
Anaheim, CA, October
-
V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of service attacks at the MAC layer in wireless an hoc networks," in Proceedings of 2002 MILCOM Conference, Anaheim, CA, October 2002
-
(2002)
Proceedings of 2002 MILCOM Conference
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
5
-
-
79955055383
-
Protecting wireless networks against a denial of service attact based on virtual jamming
-
San Diego, California, USA, September
-
D. Chen, J. Deng, and P.K. Varshney, "Protecting wireless networks against a denial of service attact based on virtual jamming," in ACM MobiCom 2003 , San Diego, California, USA, September 2003
-
(2003)
ACM MobiCom 2003
-
-
Chen, D.1
Deng, J.2
Varshney, P.K.3
-
6
-
-
1542281034
-
-
Online document, 2003, cited 2004 Jun, Available, http://www.cs.ucsd.edu/users/savage/papers/ UsenixSec03.pdf
-
J. Bellardo and S. Savage, "802.11 Denial-of-service attacks: real vulnerabilities and practical solutions," [Online document], 2003, [cited 2004 Jun], Available HTTP: http://www.cs.ucsd.edu/users/savage/papers/ UsenixSec03.pdf
-
802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions
-
-
Bellardo, J.1
Savage, S.2
-
7
-
-
84946397365
-
Wireless intrusion detection and response
-
West Point, NY, USA, June
-
Y.X. Lim, T. Schmoyer, J. Levine, and H.L. Owen, "Wireless intrusion detection and response," in Proceedings of the 2003 IEEE Workshop on Information Assurance, US Military Academy, West Point, NY, USA, June 2003 pp.68-75
-
(2003)
Proceedings of the 2003 IEEE Workshop on Information Assurance, US Military Academy
, pp. 68-75
-
-
Lim, Y.X.1
Schmoyer, T.2
Levine, J.3
Owen, H.L.4
-
8
-
-
1542360013
-
Detection and handling of MAC layer misbehavior in wireless networks
-
San Francisco, California, USA, June
-
P. Kyasanur and N. Vaidya, "Detection and handling of MAC layer misbehavior in wireless networks," in 2003 International Conference on Dependable Systems and Networks, San Francisco, California, USA, June 2003 pp.173-182
-
(2003)
2003 International Conference on Dependable Systems and Networks
, pp. 173-182
-
-
Kyasanur, P.1
Vaidya, N.2
-
9
-
-
0034546898
-
Intrusion detection in wireless ad hoc networks
-
Y.G. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Mobile Computing and Networking, pp.275-283, 2000
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.G.1
Lee, W.2
-
10
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y.G. Zhang, W. Lee, and Y.A. Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol.9, pp.545-556, 2003
-
(2003)
Wireless Networks
, vol.9
, pp. 545-556
-
-
Zhang, Y.G.1
Lee, W.2
Huang, Y.A.3
|