-
1
-
-
3042645886
-
IEEE 802.11 Standard
-
IEEE Standards Association
-
IEEE Standards Association, IEEE 802.11 Standard, http://standards.ieee. org/getieee802/download/802.11a-1999.pdf.
-
-
-
-
2
-
-
27644496325
-
Wireless security & privacy
-
IEEE press
-
Borsc, M. & Shinde, H., "Wireless security & privacy", in proc. of IEEE International Conference on Personal Wireless Communications (ICPWC '05), pp. 424-428, 2005, IEEE press.
-
(2005)
proc. of IEEE International Conference on Personal Wireless Communications (ICPWC '05)
, pp. 424-428
-
-
Borsc, M.1
Shinde, H.2
-
3
-
-
0034777649
-
Intercepting mobile communications: The Insecurity of 802.11
-
Borisov, N., Goldberg, I. & Wagner, D., "Intercepting mobile communications: The Insecurity of 802.11", in proc. of the seventh annual international conference on Mobile computing and networking, pp. 180-189, 2001.
-
(2001)
proc. of the seventh annual international conference on Mobile computing and networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
4
-
-
0003355415
-
Weakness in the key scheduling algorithm of RC4
-
Toronto, Canada
-
Fluhrer, S., Mantin, I., Shamir, A., "Weakness in the key scheduling algorithm of RC4", In Eigth Annual Workshop on selected Areas in Cryptography, Toronto, Canada, 2001.
-
(2001)
Eigth Annual Workshop on selected Areas in Cryptography
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
5
-
-
47649129830
-
-
proc. of Network and Distributed System Security Symposium, San Diego, California
-
Stubblefield, J. Ioannidis, A.D. Rubin, "Using the Fluhrer, Mantin, and Shamir Attack to break WEP", in proc. of Network and Distributed System Security Symposium, San Diego, California, 2002.
-
(2002)
Using the Fluhrer, Mantin, and Shamir Attack to break WEP
-
-
Stubblefield, J.1
Ioannidis, A.D.R.2
-
6
-
-
47649114646
-
-
IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology -Telecommunications and information exchange between systems, April 2004.
-
IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology -Telecommunications and information exchange between systems, April 2004.
-
-
-
-
8
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington D.C, USA
-
Bellardo, J. & Savage, S., "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions", in proc. of the USENIX Security Symposium, pp. 15-28, Washington D.C., USA, 2003.
-
(2003)
proc. of the USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
9
-
-
0013046241
-
An Initial Security Analysis of the IEEE 802.1X Standard
-
Technical report, CS-TR-4328, UMIACS-TR-2002-10
-
Mishra, A. & Arbaugh, W. A., "An Initial Security Analysis of the IEEE 802.1X Standard", Technical report, CS-TR-4328, UMIACS-TR-2002-10, 2002.
-
(2002)
-
-
Mishra, A.1
Arbaugh, W.A.2
-
10
-
-
33846676697
-
A sliding window based Management Traffic Clustering Algorithm for 802.11 WLAN intrusion detection
-
Zhou, W., Marshall, A., Gu, Q., "A sliding window based Management Traffic Clustering Algorithm for 802.11 WLAN intrusion detection", IFIP International Federation for Information Processing 213, pp. 55-64, 2006.
-
(2006)
IFIP International Federation for Information Processing
, vol.213
, pp. 55-64
-
-
Zhou, W.1
Marshall, A.2
Gu, Q.3
-
11
-
-
33745945665
-
Lightweight wireless intrusion detection systems against DDoS attack, Lecture Notes in Computer Science 3984
-
Lee, H.-W., "Lightweight wireless intrusion detection systems against DDoS attack", Lecture Notes in Computer Science 3984 LNCS, pp. 294-302, 2006.
-
(2006)
LNCS
, pp. 294-302
-
-
Lee, H.-W.1
-
12
-
-
33847254494
-
Intrusion detection in wireless networks using clustering techniques with expert analysis
-
Khoshgoftaar, T.M., Nath, S.V., Zhong, S., Seliya, N, "Intrusion detection in wireless networks using clustering techniques with expert analysis", in proc. of the ICMLA 2005: Fourth International Conference on Machine Learning and Applications, pp. 120-125, 2005.
-
(2005)
proc. of the ICMLA 2005: Fourth International Conference on Machine Learning and Applications
, pp. 120-125
-
-
Khoshgoftaar, T.M.1
Nath, S.V.2
Zhong, S.3
Seliya, N.4
-
13
-
-
33845876880
-
A clustering approach to wireless network intrusion detection
-
Zhong, S., Khoshgoftaar, T.M., Nath, S.V., "A clustering approach to wireless network intrusion detection", in proc. of the International Conference on Tools with Artificial Intelligence, ICTAI 2005, pp. 190-196, 2005.
-
(2005)
proc. of the International Conference on Tools with Artificial Intelligence, ICTAI
, pp. 190-196
-
-
Zhong, S.1
Khoshgoftaar, T.M.2
Nath, S.V.3
-
14
-
-
21144443798
-
Intrusion detection for Wardriving in wireless network
-
Institute of Technology
-
Feng, L.-P., Liu, M.-Y., Liu, X.-N., "Intrusion detection for Wardriving in wireless network", Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology 25 (5), pp. 415-418, 2005.
-
(2005)
Beijing Ligong Daxue Xuebao/Transaction of Beijing
, vol.25
, Issue.5
, pp. 415-418
-
-
Feng, L.-P.1
Liu, M.-Y.2
Liu, X.-N.3
-
15
-
-
20344392439
-
Intrusion detection solution to WLANs
-
Frontiers of Mobile and Wireless Communication, pp
-
Yang, H., Xie, L., Sun, J., "Intrusion detection solution to WLANs", in proc. of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, pp. 553-556, 2005.
-
(2005)
proc. of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies
, pp. 553-556
-
-
Yang, H.1
Xie, L.2
Sun, J.3
-
16
-
-
4944242978
-
Intrusion detection for wireless local area network
-
Yang, H., Xie, L., Sun, J., "Intrusion detection for wireless local area network", Canadian Conference on Electrical and Computer Engineering, pp. 1949-1952, 2004.
-
(2004)
Canadian Conference on Electrical and Computer Engineering
, pp. 1949-1952
-
-
Yang, H.1
Xie, L.2
Sun, J.3
-
17
-
-
9744233781
-
The implementation of a proactive wireless intrusion detection system
-
Hsieh, W.-C., Lo, C.-C., Lee, J.-C., Huang, L.-T., "The implementation of a proactive wireless intrusion detection system", in proc. of the fourth International Conference on Computer and Information Technology (CIT 2004), pp. 581-586, 2004.
-
(2004)
proc. of the fourth International Conference on Computer and Information Technology (CIT
, pp. 581-586
-
-
Hsieh, W.-C.1
Lo, C.-C.2
Lee, J.-C.3
Huang, L.-T.4
-
18
-
-
47649122869
-
Extensible authentication protocol (EAP) and IEEE 802.1x: Tutorial and empirical experience
-
IEEE Dec, supl.32
-
Jyh-Cheng Chen; Yu-Ping Wang, "Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience", Communications Magazine, IEEE Volume 43, Issue 12, supl.26 - supl.32, Dec. 2005.
-
(2005)
Communications Magazine
, vol.43
, Issue.12 SUPL.26
-
-
Chen, J.-C.1
Wang, Y.-P.2
-
19
-
-
47649125943
-
-
Ferguson, N., Michael: An Improved MIC for 802.11 WEP, IEEE TGi doc 802.11-02/020r0, January 2002.
-
Ferguson, N., "Michael: An Improved MIC for 802.11 WEP, IEEE TGi doc 802.11-02/020r0, January 2002.
-
-
-
-
20
-
-
47649112233
-
-
Junaid, M., Dr Muid Mufti, M.Umar Ilyas, Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol, White Paper, electronically available at: http://whitepapers.techrepublic.com.com/whitepaper.aspx?&tags= attack&docid=268394.
-
Junaid, M., Dr Muid Mufti, M.Umar Ilyas, "Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol", White Paper, electronically available at: http://whitepapers.techrepublic.com.com/whitepaper.aspx?&tags= attack&docid=268394.
-
-
-
|