-
1
-
-
42149188637
-
-
AirDefense, Wireless LAN Security. http://airdefense.net.
-
Security
-
-
-
2
-
-
42149142143
-
-
AirMagnet
-
AirMagnet. http://www.airmagnet.com.
-
-
-
-
5
-
-
42149108290
-
-
Host AP. http://hostap.epitest.fi.
-
-
-
Host, A.P.1
-
6
-
-
42149087498
-
-
http://www.endace.com.
-
-
-
-
7
-
-
42149168298
-
-
Microsoft Windows 2000 TCP/IP implementation details, http://www.microsoft.com/technet/itsolu tions/network/deploy/depovg/tcpip2k .mspx.
-
Microsoft Windows 2000 TCP/IP implementation details, http://www.microsoft.com/technet/itsolu tions/network/deploy/depovg/tcpip2k .mspx.
-
-
-
-
8
-
-
42149162643
-
-
NetStumbler
-
NetStumbler. http://www.netstumbler.com.
-
-
-
-
10
-
-
11244291937
-
Architecture and techniques for diagnosing faults in ieee 802.11 infrastructure networks
-
September
-
A. Adya, V. Bahl, R. Chandra, and L. Qiu. Architecture and techniques for diagnosing faults in ieee 802.11 infrastructure networks. In Proc. ACM MOBICOM, September 2004.
-
(2004)
Proc. ACM MOBICOM
-
-
Adya, A.1
Bahl, V.2
Chandra, R.3
Qiu, L.4
-
11
-
-
33748979867
-
Enhancing the security of corporate Wi-Fi networks using DAIR
-
P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill. Enhancing the security of corporate Wi-Fi networks using DAIR. In Proc. ACM MOBISYS, 2006.
-
(2006)
Proc. ACM MOBISYS
-
-
Bahl, P.1
Chandra, R.2
Padhye, J.3
Ravindranath, L.4
Singh, M.5
Wolman, A.6
Zill, B.7
-
12
-
-
42149143903
-
Detecting 802.11 wireless hosts from remote passive observations
-
Atlanta, GE, May
-
V. Baiamonte, K. Papagiannaki, and G. Iannaccone. Detecting 802.11 wireless hosts from remote passive observations. In Proc. IFIP/TC6 Networking, Atlanta, GE, May 2007.
-
(2007)
Proc. IFIP/TC6 Networking
-
-
Baiamonte, V.1
Papagiannaki, K.2
Iannaccone, G.3
-
13
-
-
18144401989
-
Rogue access point detection using temporal traffic characteristics
-
Dec
-
R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland. Rogue access point detection using temporal traffic characteristics. In Proc. IEEE GLOBECOM, Dec 2004.
-
(2004)
Proc. IEEE GLOBECOM
-
-
Beyah, R.1
Kangude, S.2
Yu, G.3
Strickland, B.4
Copeland, J.5
-
16
-
-
25844480332
-
On the effect of contention-window sizes in IEEE 802.11b networks
-
Technical Report ALR-2002-024, Avaya Labs Research
-
S. Garg, M. Kappes, and A. S. Krishnakumar. On the effect of contention-window sizes in IEEE 802.11b networks. Technical Report ALR-2002-024, Avaya Labs Research, 2002.
-
(2002)
-
-
Garg, S.1
Kappes, M.2
Krishnakumar, A.S.3
-
19
-
-
40049098504
-
RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning
-
to appear
-
C. Mano, A. Blaich, Q. Liao, Y. Jiang, D. Salyers, D. Cieslak, and A. Striegel. RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning. ACM Transactions on Information Systems and Security, to appear.
-
ACM Transactions on Information Systems and Security
-
-
Mano, C.1
Blaich, A.2
Liao, Q.3
Jiang, Y.4
Salyers, D.5
Cieslak, D.6
Striegel, A.7
-
20
-
-
39049167712
-
-
Packet trace analysis. http://ipmon.sprintlabs.com/packstat/ packetoverview.php.
-
Packet trace analysis
-
-
-
23
-
-
0031274649
-
Wide-area Internet traffic patterns and characteristics
-
Nov./Dec
-
K. Thompson, G. Miller, and R. Wilder. Wide-area Internet traffic patterns and characteristics. IEEE Network, 11(6):10-23, Nov./Dec. 1997.
-
(1997)
IEEE Network
, vol.11
, Issue.6
, pp. 10-23
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
25
-
-
39049088703
-
Identifying 802.11 traffic from passive measurements using iterative Bayesian inference
-
W. Wei, S. Jaiswal, J. Kurose, and D. Towsley. Identifying 802.11 traffic from passive measurements using iterative Bayesian inference. In Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Wei, W.1
Jaiswal, S.2
Kurose, J.3
Towsley, D.4
-
26
-
-
25844438828
-
Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup?
-
March
-
W. Wei, B. Wang, C. Zhang, J. Kurose, and D. Towsley. Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup? In Proc. IEEE INFOCOM, March 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Wei, W.1
Wang, B.2
Zhang, C.3
Kurose, J.4
Towsley, D.5
-
27
-
-
51249109756
-
Detecting Protected Layer-3 Rogue APs
-
Raleigh, NC, September
-
H. Yin, G. Chen, and J. Wang. Detecting Protected Layer-3 Rogue APs. In Proceedings of the Fourth IEEE International Conference on Broadband Communications, Networks, and Systems (BROADNETS), Raleigh, NC, September 2007.
-
(2007)
Proceedings of the Fourth IEEE International Conference on Broadband Communications, Networks, and Systems (BROADNETS)
-
-
Yin, H.1
Chen, G.2
Wang, J.3
|