-
2
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
S. Setia and V. Swarup, editors, ACM
-
C.-Y. Chin-Yang Tseng, B. P., C. Ko, R. Limprasittiporn, J. Rowe, and K. N. Levitt. A specification-based intrusion detection system for AODV. In S. Setia and V. Swarup, editors, SASN, pages 125-134. ACM, 2003.
-
(2003)
SASN
, pp. 125-134
-
-
Chin-Yang Tseng, C.-Y.1
Ko, B.P.C.2
Limprasittiporn, R.3
Rowe, J.4
Levitt, K.N.5
-
3
-
-
0038391162
-
Agent based intrusion detection and response system for wireless LANs
-
11-15 May
-
M. Chirumamilla and B. Ramamurthy. Agent based intrusion detection and response system for wireless LANs. In IEEE ICC '03. Volume: 1 , 11-15 May, pages 492-496, 2003.
-
(2003)
IEEE ICC '03
, vol.1
, pp. 492-496
-
-
Chirumamilla, M.1
Ramamurthy, B.2
-
4
-
-
35548944839
-
Intrusion detection: Introduction to intrusion detection and security information management
-
H. Debar and J. Viinikka. Intrusion detection: Introduction to intrusion detection and security information management. In FOSAD 2004/2005, 2005.
-
(2005)
FOSAD
, vol.2004-2005
-
-
Debar, H.1
Viinikka, J.2
-
5
-
-
84872818485
-
-
R. Gill, J. Smith, and A. Clark. Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In R. Safavi-Naini, C. Steketee, and W. Susilo, editors, Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 54 of CRPIT, pages 221-230, Hobart, Australia, 2006. ACS.
-
R. Gill, J. Smith, and A. Clark. Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In R. Safavi-Naini, C. Steketee, and W. Susilo, editors, Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), volume 54 of CRPIT, pages 221-230, Hobart, Australia, 2006. ACS.
-
-
-
-
6
-
-
33745663748
-
Sequence number-based MAC address spoof detection
-
A. Valdes and D. Zamboni, editors, RAID, of, Springer
-
F. Guo and T. Chiueh. Sequence number-based MAC address spoof detection. In A. Valdes and D. Zamboni, editors, RAID, volume 3858 of LNCS, pages 309 - 329. Springer, 2005.
-
(2005)
LNCS
, vol.3858
, pp. 309-329
-
-
Guo, F.1
Chiueh, T.2
-
8
-
-
39049121719
-
-
IEEE Std 802.11i-2004. WLAN Security Standard. IEEE Standards Association, 23rd July 2004.
-
IEEE Std 802.11i-2004. WLAN Security Standard. IEEE Standards Association, 23rd July 2004.
-
-
-
-
9
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Software Eng., 21 (3): 181-199, 1995.
-
(1995)
IEEE Trans. Software Eng
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
11
-
-
84946397365
-
Wireless intrusion detection and response
-
Man and Cybernetics Society, 18-20 June
-
Y.-X. Lim, T. Yer, J. Levine, and H. Owen. Wireless intrusion detection and response. In Information Assurance Workshop. IEEE Systems, Man and Cybernetics Society, 18-20 June, pages 68-75, 2003.
-
(2003)
Information Assurance Workshop. IEEE Systems
, pp. 68-75
-
-
Lim, Y.-X.1
Yer, T.2
Levine, J.3
Owen, H.4
-
12
-
-
39049086740
-
An Initial Security Analysis of the IEEE 802.IX Standard
-
Technical report
-
A. Mishra and W. Arbaugh. An Initial Security Analysis of the IEEE 802.IX Standard. Technical report, 2003.
-
(2003)
-
-
Mishra, A.1
Arbaugh, W.2
-
13
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
V. Atluri, editor, ACM
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and Z. S. Specification-based anomaly detection: a new approach for detecting network intrusions. In V. Atluri, editor, ACM CCS, pages 265 - 274. ACM, 2002.
-
(2002)
ACM CCS
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
14
-
-
39049165708
-
-
D. Stanley, J. Walker, and B. Aboba. Extensible authentication protocol (EAP) method requirements for wireless LANs. Technical report, IETF, 2005. RFC 4017.
-
D. Stanley, J. Walker, and B. Aboba. Extensible authentication protocol (EAP) method requirements for wireless LANs. Technical report, IETF, 2005. RFC 4017.
-
-
-
-
15
-
-
39049171890
-
-
J. Wright. Detecting wireless LAN MAC address spoofing, 2003. White paper.
-
J. Wright. Detecting wireless LAN MAC address spoofing, 2003. White paper.
-
-
-
|