메뉴 건너뛰기




Volumn 5, Issue , 2006, Pages 2329-2334

A passive approach to wireless NIC identification

Author keywords

Host identification; Network management; Network security; Wireless security

Indexed keywords

IDENTIFICATION (CONTROL SYSTEMS); INTERFACES (COMPUTER); NETWORK MANAGEMENT; WIRELESS NETWORKS;

EID: 42549087740     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2006.255117     Document Type: Conference Paper
Times cited : (27)

References (17)
  • 1
    • 85177203223 scopus 로고    scopus 로고
    • Nikita Borisov, Ian Golberg, and David Wagner, Intercepting mobile communications: The insecurity of 802.11, MOBICOM 2001
    • Nikita Borisov, Ian Golberg, and David Wagner, "Intercepting mobile communications: The insecurity of 802.11," MOBICOM 2001
  • 2
    • 0003948271 scopus 로고    scopus 로고
    • Your 802.11 wireless network has no clothes
    • William A. Arbaugh, Narendar Shankar, and Y.C. Justin Wan, "Your 802.11 wireless network has no clothes," http://www.cs.umd.edu/~waa/ wireless.pdf
    • Arbaugh, W.A.1    Shankar, N.2    Justin Wan, Y.C.3
  • 3
    • 42549126967 scopus 로고    scopus 로고
    • The Definitive Guide To Wireless WarX'ing, teknik.ekitap.gen.tr/TDGTW- WarXing.html
    • The Definitive Guide To Wireless WarX'ing, teknik.ekitap.gen.tr/TDGTW- WarXing.html
  • 4
    • 42549089320 scopus 로고    scopus 로고
    • AirDefense, www.airdefense.net
    • AirDefense
  • 5
    • 4544330951 scopus 로고    scopus 로고
    • Detecting Wireless LAN MAC Address Spoofing
    • home.jwu.edu/jwright
    • Joshua Wright, "Detecting Wireless LAN MAC Address Spoofing," home.jwu.edu/jwright/
    • Wright, J.1
  • 6
    • 42549166646 scopus 로고    scopus 로고
    • www.wimetrics.com
  • 7
    • 42549106542 scopus 로고    scopus 로고
    • www.ipass.com/services/services_deviceid.html
  • 8
    • 42549141279 scopus 로고    scopus 로고
    • www.decodesystems.com/mt/97dec/
  • 9
    • 33847292826 scopus 로고    scopus 로고
    • Detection of Transient in Radio Frequency Fingerprinting using Signal Phase
    • Thomas, US Virgin Islands, November
    • Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis, "Detection of Transient in Radio Frequency Fingerprinting using Signal Phase," Internet and Information Technology (CUT), St. Thomas, US Virgin Islands, November 2004.
    • (2004) Internet and Information Technology (CUT), St
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 11
    • 42549104645 scopus 로고    scopus 로고
    • IEEE 802.11 Rate Adaption: A Practical Approach
    • Venice, Italy, October
    • M.Lacage, M. Manshaei, and T. Turletti, "IEEE 802.11 Rate Adaption: A Practical Approach," ACM/IEEE MSWIM, Venice, Italy, October 2004.
    • (2004) ACM/IEEE MSWIM
    • Lacage, M.1    Manshaei, M.2    Turletti, T.3
  • 13
    • 85086420696 scopus 로고    scopus 로고
    • Using Signal Processing to Analyze Wireless Data Traffic
    • Atlanta, GA, USA, September 28
    • Craig Partridge et al., "Using Signal Processing to Analyze Wireless Data Traffic," ACM Workshop on Wireless Security (WiSe), Atlanta, GA, USA, September 28, 2002.
    • (2002) ACM Workshop on Wireless Security (WiSe)
    • Partridge, C.1
  • 15
    • 0003974515 scopus 로고    scopus 로고
    • 2nd Edition. Indianapolis, IN: SAMs
    • Jim Geier, Wireless LANs, 2nd Edition. Indianapolis, IN: SAMs, 2001.
    • (2001) Wireless LANs
    • Geier, J.1
  • 17
    • 33845941898 scopus 로고    scopus 로고
    • Identification of repeated attacks using network traffic forensics,
    • Technical Report ISI-TR-2003-577b, USC/Information Sciences Institute, August
    • Alefiya Hussain, John Heidemann, Christos Papadopoulos, "Identification of repeated attacks using network traffic forensics," Technical Report ISI-TR-2003-577b, USC/Information Sciences Institute, August, 2003.
    • (2003)
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.