-
1
-
-
34547488337
-
Robust detection of selfish misbehavior in wireless networks
-
Aug
-
A. L. Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124-1134, Aug. 2007.
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.6
, pp. 1124-1134
-
-
Toledo, A.L.1
Wang, X.2
-
2
-
-
25644442524
-
On selfish behavior in CSMA/CA networks
-
presented at the, Miami, FL, Mar
-
M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On selfish behavior in CSMA/CA networks," presented at the IEEE Infocom, Miami, FL, Mar. 2005.
-
(2005)
IEEE Infocom
-
-
Cagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.-P.4
-
3
-
-
0035508757
-
Game theory and the design of self-configuring, adaptive wireless networks
-
Nov
-
A. MacKenzie and S. Wicker, "Game theory and the design of self-configuring, adaptive wireless networks." IEEE Commun. Mag., vol. 39, no. 11, pp. 126-131, Nov. 2001.
-
(2001)
IEEE Commun. Mag
, vol.39
, Issue.11
, pp. 126-131
-
-
MacKenzie, A.1
Wicker, S.2
-
4
-
-
0042474409
-
Stability of multipacket slotted aloha with selfish users and perfect information
-
presented at the, San Francisco, CA, Apr
-
A. MacKenzie and S. Wicker, "Stability of multipacket slotted aloha with selfish users and perfect information," presented at the IEEE Infocom, San Francisco, CA, Apr. 2003.
-
(2003)
IEEE Infocom
-
-
MacKenzie, A.1
Wicker, S.2
-
5
-
-
85008044268
-
Selfish MAC layer misbehavior in wireless networks
-
Sep./Oct
-
P. Kyasanur and N. H. Vaidya, "Selfish MAC layer misbehavior in wireless networks." IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 502-516, Sep./Oct. 2005.
-
(2005)
IEEE Trans. Mobile Comput
, vol.4
, Issue.5
, pp. 502-516
-
-
Kyasanur, P.1
Vaidya, N.H.2
-
6
-
-
49549119421
-
-
M. Acharya, T. Sharma, D. Thuente, and D. Sizemore, Intelligentjamming in 802.11b wireless networks, presented at the OPNETWORK, Washington, DC, Aug. 2004.
-
M. Acharya, T. Sharma, D. Thuente, and D. Sizemore, " Intelligentjamming in 802.11b wireless networks," presented at the OPNETWORK, Washington, DC, Aug. 2004.
-
-
-
-
7
-
-
51949113065
-
Intelligent jamming in wireless networks with applcations to 802.11b and other networks
-
presented at the, Washington, DC. Oct
-
D. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applcations to 802.11b and other networks," presented at the 2006 IEEE MILCOM, Washington, DC. Oct. 2006.
-
(2006)
2006 IEEE MILCOM
-
-
Thuente, D.1
Acharya, M.2
-
8
-
-
4544221258
-
Access points vulnerabilities to dos attacks in 802.11 networks
-
presented at the, Atlanta, GA, Mar
-
F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access points vulnerabilities to dos attacks in 802.11 networks," presented at the IEEE Wireless Commun. Net. Conf., Atlanta, GA, Mar. 2004.
-
(2004)
IEEE Wireless Commun. Net. Conf
-
-
Ferreri, F.1
Bernaschi, M.2
Valcamonici, L.3
-
9
-
-
33947131246
-
Dos attacks and defense mechanisms in wireless networks
-
presented at the, Guangzhou, China, Nov
-
L. A. Mohammed and B. Issac, "Dos attacks and defense mechanisms in wireless networks," presented at the Int. Conf. Mobile Tech. Appl. Syst., Guangzhou, China, Nov. 2005.
-
(2005)
Int. Conf. Mobile Tech. Appl. Syst
-
-
Mohammed, L.A.1
Issac, B.2
-
10
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
presented at the, Washington, DC, Aug
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," presented at the USENIX Security Symp., Washington, DC, Aug. 2003.
-
(2003)
USENIX Security Symp
-
-
Bellardo, J.1
Savage, S.2
-
11
-
-
33847392537
-
Effect of pulse jamming on ieee 802.11 wireless lan performance
-
presented at the, Atlantic City, NJ, Oct
-
M. Hall, A. Silvennoinen, and S. G. Haggman, "Effect of pulse jamming on ieee 802.11 wireless lan performance," presented at the IEEE MILCOM. Atlantic City, NJ, Oct. 2005.
-
(2005)
IEEE MILCOM
-
-
Hall, M.1
Silvennoinen, A.2
Haggman, S.G.3
-
12
-
-
33745966425
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
presented at the, Urbana-Champaign, IL, May
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," presented at the ACM MobiHoc, Urbana-Champaign, IL, May 2005.
-
(2005)
ACM MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
13
-
-
49549094344
-
Detecting MAC layer collision abnormalities in CSMA/CA wireless networks
-
presented at the, Beijing, China, May
-
A. L. Toledo and X. Wang, "Detecting MAC layer collision abnormalities in CSMA/CA wireless networks," presented at the IEEE Int. Conf. Commun., Beijing, China, May 2008.
-
(2008)
IEEE Int. Conf. Commun
-
-
Toledo, A.L.1
Wang, X.2
-
14
-
-
24144449882
-
Dos analysis of reservation based mac protocols
-
presented at the, Seoul, Korea, May
-
R. Negi and A. Rajeswaran, "Dos analysis of reservation based mac protocols," presented at the IEEE Int. Conf. Commun., Seoul, Korea, May 2005.
-
(2005)
IEEE Int. Conf. Commun
-
-
Negi, R.1
Rajeswaran, A.2
-
15
-
-
49549123657
-
Incentive compatible medium access control in wireless networks
-
presented at the, GameNets, Pisa, Italy, Oct
-
N. BenAmmar and J. S. Baras, "Incentive compatible medium access control in wireless networks," presented at the Workshop Game Theory Commun. and Net. (GameNets), Pisa, Italy, Oct. 2006.
-
(2006)
Workshop Game Theory Commun. and Net
-
-
BenAmmar, N.1
Baras, J.S.2
-
16
-
-
49549087157
-
-
2 attacks in 802.11b wireless networks, presented at the OPNETWORK, Washington, DC, Aug. 2005.
-
2 attacks in 802.11b wireless networks," presented at the OPNETWORK, Washington, DC, Aug. 2005.
-
-
-
-
17
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols
-
presented at the, Alexandria, VA, Nov
-
Y. W. Law, L. van Hoesel, J. Doumen. P. Hartel, and P. Havinga, "Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols," presented at the ACM Workshop Security Ad Hoc Sensor Net. (SASN), Alexandria, VA, Nov. 2005.
-
(2005)
ACM Workshop Security Ad Hoc Sensor Net. (SASN)
-
-
Law, Y.W.1
van Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
18
-
-
33746885902
-
Adaptive optimization of IEEE 802.11 DCF based on bayesian estimation of the number of competing terminals
-
Nov
-
A. L. Toledo, T. Vercauteren, and X. Wang, "Adaptive optimization of IEEE 802.11 DCF based on bayesian estimation of the number of competing terminals," IEEE Trans. Mobile Comput., vol. 5, no. 9, pp. 1283-1296, Nov. 2006.
-
(2006)
IEEE Trans. Mobile Comput
, vol.5
, Issue.9
, pp. 1283-1296
-
-
Toledo, A.L.1
Vercauteren, T.2
Wang, X.3
-
19
-
-
3943058268
-
A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF
-
Jul
-
C. Wang, B. Li, and L. Li, "A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF," IEEE Trans. Veh. Technol., vol. 53, no. 4, pp. 1235-1246, Jul. 2004.
-
(2004)
IEEE Trans. Veh. Technol
, vol.53
, Issue.4
, pp. 1235-1246
-
-
Wang, C.1
Li, B.2
Li, L.3
-
21
-
-
0041438376
-
-
G. Bianchi and I. Tinnirello, Kalman fitler estimation of the number of competing terminals in an IEEE 802.11 network, presented at the Infocom, San Francisco, CA, Mar. 2003.
-
G. Bianchi and I. Tinnirello, "Kalman fitler estimation of the number of competing terminals in an IEEE 802.11 network," presented at the Infocom, San Francisco, CA, Mar. 2003.
-
-
-
-
22
-
-
85008537091
-
Batch and sequential bayesian estimators of the number of active terminals in an IEEE 802.11 network
-
Feb
-
T. Vercauteren, A. L. Toledo, and X. Wang, "Batch and sequential bayesian estimators of the number of active terminals in an IEEE 802.11 network," IEEE Trans. Signal Process., vol. 55, no. 2, pp. 437-450, Feb. 2007.
-
(2007)
IEEE Trans. Signal Process
, vol.55
, Issue.2
, pp. 437-450
-
-
Vercauteren, T.1
Toledo, A.L.2
Wang, X.3
-
23
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
Mar
-
G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordination function." IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535-547, Mar. 2000.
-
(2000)
IEEE J. Sel. Areas Commun
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
24
-
-
84941871856
-
The Kolmogorov-Smirnov test for goodnes of fit
-
F. Massey, "The Kolmogorov-Smirnov test for goodnes of fit," J. Amer. Statist. Assoc., vol. 46, no. 253, pp. 68-78, 1951.
-
(1951)
J. Amer. Statist. Assoc
, vol.46
, Issue.253
, pp. 68-78
-
-
Massey, F.1
-
25
-
-
0037914860
-
The δ-corrected Kolmogorov-Smirnov test for goodness of fit
-
H. Khamis. "The δ-corrected Kolmogorov-Smirnov test for goodness of fit," J. Statist. Planning Inference, vol. 24, pp. 317-335, 1990.
-
(1990)
J. Statist. Planning Inference
, vol.24
, pp. 317-335
-
-
Khamis, H.1
-
26
-
-
1542736959
-
The two-stage δ-corrected Kolmogorov-Smirnov test
-
H. Khamis, "The two-stage δ-corrected Kolmogorov-Smirnov test," J. Appl. Statist., vol. 27, no. 4, pp. 439-450, 2000.
-
(2000)
J. Appl. Statist
, vol.27
, Issue.4
, pp. 439-450
-
-
Khamis, H.1
-
27
-
-
0004161838
-
-
Cambridge, U.K, Cambridge Univ. Press
-
W. Press, S. Teukolsky, W. Vetterling, and B. Flannery, Numerical Recipes in C: The Art of Scientific Computing., Cambridge, U.K.: Cambridge Univ. Press, 1992.
-
(1992)
Numerical Recipes in C: The Art of Scientific Computing
-
-
Press, W.1
Teukolsky, S.2
Vetterling, W.3
Flannery, B.4
-
29
-
-
33749037166
-
A framework for MAC protocol misbehavior detection in wireless networks
-
presented at the, Cologne, Germany, Sep
-
S. Radosavac, J. S. Baras, and I. Koutsopoulos, "A framework for MAC protocol misbehavior detection in wireless networks," presented at the ACM Workshop Wireless Security, Cologne, Germany, Sep. 2005.
-
(2005)
ACM Workshop Wireless Security
-
-
Radosavac, S.1
Baras, J.S.2
Koutsopoulos, I.3
|