메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 50-59

Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; PACKET NETWORKS; TELECOMMUNICATION TRAFFIC; TRANSCEIVERS;

EID: 43849104129     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAHCN.2006.288408     Document Type: Conference Paper
Times cited : (32)

References (17)
  • 1
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the USENIX Security Symposium, 2003, pp. 15-28.
    • (2003) Proceedings of the USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 2
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the ieee 802.1x standard,
    • Tech. Rep. CS-TR-4328, University of Maryland, College Park
    • A. Mishra and W. A. Arbaugh, "An initial security analysis of the ieee 802.1x standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.
    • (2002)
    • Mishra, A.1    Arbaugh, W.A.2
  • 8
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 10
    • 26644439585 scopus 로고    scopus 로고
    • Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation
    • A. Wool, "Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation," ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.
    • (2005) ACM/Springer Wireless Networks , vol.11 , Issue.6 , pp. 677-686
    • Wool, A.1
  • 16
    • 0036152263 scopus 로고    scopus 로고
    • On credibility of simulation studies of telecommunication networks
    • K. Pawlikowski, H. D. J. Jeong, and J. S. R. Lee, "On credibility of simulation studies of telecommunication networks," IEEE Communications Magazine, vol. 40, no. 1, pp. 132-139, 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.1 , pp. 132-139
    • Pawlikowski, K.1    Jeong, H.D.J.2    Lee, J.S.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.