-
1
-
-
85177203223
-
-
Nikita Borisov, Ian Golberg, and David Wagner, Intercepting mobile communications: The insecurity of 802.11, MOBICOM 2001
-
Nikita Borisov, Ian Golberg, and David Wagner, "Intercepting mobile communications: The insecurity of 802.11," MOBICOM 2001
-
-
-
-
2
-
-
0003948271
-
Your 802.11 wireless network has no clothes
-
William A. Arbaugh, Narendar Shankar, and Y.C. Justin Wan, "Your 802.11 wireless network has no clothes," http://www.cs.umd.edu/~waa/ wireless.pdf
-
-
-
Arbaugh, W.A.1
Shankar, N.2
Justin Wan, Y.C.3
-
3
-
-
42549126967
-
-
The Definitive Guide To Wireless WarX'ing, teknik.ekitap.gen.tr/TDGTW- WarXing.html
-
The Definitive Guide To Wireless WarX'ing, teknik.ekitap.gen.tr/TDGTW- WarXing.html
-
-
-
-
4
-
-
42549089320
-
-
AirDefense, www.airdefense.net
-
AirDefense
-
-
-
5
-
-
4544330951
-
Detecting Wireless LAN MAC Address Spoofing
-
home.jwu.edu/jwright
-
Joshua Wright, "Detecting Wireless LAN MAC Address Spoofing," home.jwu.edu/jwright/
-
-
-
Wright, J.1
-
6
-
-
42549166646
-
-
www.wimetrics.com
-
-
-
-
7
-
-
42549106542
-
-
www.ipass.com/services/services_deviceid.html
-
-
-
-
8
-
-
42549141279
-
-
www.decodesystems.com/mt/97dec/
-
-
-
-
9
-
-
33847292826
-
Detection of Transient in Radio Frequency Fingerprinting using Signal Phase
-
Thomas, US Virgin Islands, November
-
Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis, "Detection of Transient in Radio Frequency Fingerprinting using Signal Phase," Internet and Information Technology (CUT), St. Thomas, US Virgin Islands, November 2004.
-
(2004)
Internet and Information Technology (CUT), St
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
10
-
-
24344507334
-
Remote physical device fingerprinting
-
April-June
-
Tadayoshi Kohno, Andre Briodo, KC Claffy, "Remote physical device fingerprinting," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 93-108, April-June 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Andre Briodo, K.C.C.2
-
11
-
-
42549104645
-
IEEE 802.11 Rate Adaption: A Practical Approach
-
Venice, Italy, October
-
M.Lacage, M. Manshaei, and T. Turletti, "IEEE 802.11 Rate Adaption: A Practical Approach," ACM/IEEE MSWIM, Venice, Italy, October 2004.
-
(2004)
ACM/IEEE MSWIM
-
-
Lacage, M.1
Manshaei, M.2
Turletti, T.3
-
12
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
Taipei, Taiwan
-
Chen-Mou Cheng, H.T. Kung, and Koan-Sin Tan, "Use of spectral analysis in defense against DoS attacks," in Proceedings of the IEEE GLOBECOM, Taipei, Taiwan, 2002.
-
(2002)
Proceedings of the IEEE GLOBECOM
-
-
Chen-Mou Cheng, H.T.K.1
Tan, K.-S.2
-
13
-
-
85086420696
-
Using Signal Processing to Analyze Wireless Data Traffic
-
Atlanta, GA, USA, September 28
-
Craig Partridge et al., "Using Signal Processing to Analyze Wireless Data Traffic," ACM Workshop on Wireless Security (WiSe), Atlanta, GA, USA, September 28, 2002.
-
(2002)
ACM Workshop on Wireless Security (WiSe)
-
-
Partridge, C.1
-
15
-
-
0003974515
-
-
2nd Edition. Indianapolis, IN: SAMs
-
Jim Geier, Wireless LANs, 2nd Edition. Indianapolis, IN: SAMs, 2001.
-
(2001)
Wireless LANs
-
-
Geier, J.1
-
17
-
-
33845941898
-
Identification of repeated attacks using network traffic forensics,
-
Technical Report ISI-TR-2003-577b, USC/Information Sciences Institute, August
-
Alefiya Hussain, John Heidemann, Christos Papadopoulos, "Identification of repeated attacks using network traffic forensics," Technical Report ISI-TR-2003-577b, USC/Information Sciences Institute, August, 2003.
-
(2003)
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
|