-
1
-
-
56749132838
-
-
PROTOS, security testing of protocol implementations
-
PROTOS - security testing of protocol implementations. http://www.ee.oulu.fi/rcscarch/ouspg/protos/.
-
-
-
-
2
-
-
56749180320
-
Active behavioral fingerprinting of wireless devices
-
Technical report, Institute for Security Technology Studies. Dartmouth College
-
Sergey Bratus, Cory Cornelius. David Kotz, and Daniel Peebles. Active behavioral fingerprinting of wireless devices. Technical report, Institute for Security Technology Studies. Dartmouth College, 2008.
-
(2008)
-
-
Bratus, S.1
Cornelius, C.2
Kotz, D.3
Peebles, D.4
-
3
-
-
56749183183
-
-
Laurent Butti. Wi-Fi advanced fuzzing. Black Hat Europe, February 2007.
-
Laurent Butti. Wi-Fi advanced fuzzing. Black Hat Europe, February 2007.
-
-
-
-
4
-
-
36448988479
-
Fingerprinting 802.11 implementations via statistical analysis of the duration field
-
September
-
Johnny Cache. Fingerprinting 802.11 implementations via statistical analysis of the duration field. Uninformed.org. 5, September 2006.
-
(2006)
Uninformed.org
, pp. 5
-
-
Cache, J.1
-
6
-
-
56749132835
-
Exploiting 802.11 wireless driver vulnerabilities on Windows
-
January
-
Johnny Cache, H D Moore, and skape. Exploiting 802.11 wireless driver vulnerabilities on Windows. Uninformed.org, 6, January 2007.
-
(2007)
Uninformed.org
, vol.6
-
-
Cache, J.1
Moore, H.D.2
skape3
-
7
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
USENIX, August
-
Jason Franklin. Damon McCoy, Parisa Tabriz, Vicentiu Neagoe, Jamie Van Randwyk, and Douglas Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In Proceedings of loth USENIX Security Symposium, pages 167 178. USENIX, August 2006.
-
(2006)
Proceedings of loth USENIX Security Symposium
, pp. 167-178
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Van Randwyk, J.5
Sicker, D.6
-
8
-
-
34247325614
-
An empirical analysis of heterogeneity in IEEE 802.11 MAC protocol implementations and its implications
-
New York. NY, USA, ACM Press
-
K. N. Gopinath, Pravin Bhagwat, and K. Gopinath. An empirical analysis of heterogeneity in IEEE 802.11 MAC protocol implementations and its implications. In WiNTECH '06: Proceedings of the 1st International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, pages 80 87, New York. NY, USA, 2006. ACM Press.
-
(2006)
WiNTECH '06: Proceedings of the 1st International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization
, pp. 80-87
-
-
Gopinath, K.N.1
Bhagwat, P.2
Gopinath, K.3
-
12
-
-
1442267080
-
Learning decision lists
-
Ronald L. Rivest. Learning decision lists. Machine Learning, 2(3):229-246, 1987.
-
(1987)
Machine Learning
, vol.2
, Issue.3
, pp. 229-246
-
-
Rivest, R.L.1
-
13
-
-
56749168713
-
-
Kathy Wang. Frustrating OS fingerprinting with Morph. DEFCON 12, August 2004.
-
Kathy Wang. Frustrating OS fingerprinting with Morph. DEFCON 12, August 2004.
-
-
-
|