-
1
-
-
27644564187
-
Quality-of-protection (QoP)-an online monitoring and self-protection mechanism Selected Areas in Communications
-
S Hariri, G Qu, R Modukuri, H Chen, M Yousif Quality-of-protection (QoP)-an online monitoring and self-protection mechanism Selected Areas in Communications, IEEE Journal on, 2005 - ieeexplore.ieee.org
-
(2005)
IEEE Journal on
-
-
Hariri, S.1
Qu, G.2
Modukuri, R.3
Chen, H.4
Yousif, M.5
-
2
-
-
4544324338
-
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots
-
June, Boston, USA
-
M. Raya, J. P. Hubaux, I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots" ACM MobiSys 2004, June 2004, Boston, USA.
-
(2004)
ACM MobiSys 2004
-
-
Raya, M.1
Hubaux, J.P.2
Aad, I.3
-
6
-
-
33745922391
-
Wireless Hotspots: "Petri Dish of Wireless Security
-
June
-
B. Potter. Wireless Hotspots: "Petri Dish of Wireless Security", Commmunications ACM 6, 49 (June 2006), 51-52
-
(2006)
Commmunications ACM
, vol.6
, Issue.49
, pp. 51-52
-
-
Potter, B.1
-
8
-
-
0042063842
-
Wireless Security Is Different
-
IEEE
-
WA Arbaugh, "Wireless Security Is Different" Computer, IEEE ,vol. 35, no. 8, pp. 99-101, 2003.
-
(2003)
Computer
, vol.35
, Issue.8
, pp. 99-101
-
-
Arbaugh, W.A.1
-
10
-
-
1542747838
-
Detection of transient in radio frequency fingerprinting using phase characteristics of signals
-
L. Hesselink, editor, Banff, Alberta, Canada, July, ACTA Press
-
rd IASTED International Conference on Wireless and Optical Communications (WOC 2003), pages 13-18, Banff, Alberta, Canada, July 2003. ACTA Press.
-
(2003)
rd IASTED International Conference on Wireless and Optical Communications (WOC
, pp. 13-18
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
11
-
-
18144362066
-
A location enabled wireless security system
-
IEEE
-
Malaney, R.A. (2004). "A location enabled wireless security system", Global Telecommunications Conference, 2004. GLOBECOM '04, IEEE, 4(29), 2196-2200.
-
(2004)
Global Telecommunications Conference, 2004. GLOBECOM '04
, vol.4
, Issue.29
, pp. 2196-2200
-
-
Malaney, R.A.1
-
12
-
-
4544317724
-
Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack
-
Atlanta Ga, March
-
T Schmoyer, Y Lim and H. Owen, "Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack", In IEEE Wireless Communications and Networking Conference, Atlanta Ga., March 2004.
-
(2004)
IEEE Wireless Communications and Networking Conference
-
-
Schmoyer, T.1
Lim, Y.2
Owen, H.3
-
13
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
Oakland, California
-
Lee, W., Stolfo, S. J., Mok, K.. 1999, "A data mining framework for building intrusion detection models", In Proceedings of the 1999 IEEE Symposium on Security and Privacy (Oakland, California,).
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
14
-
-
11244278744
-
Analysis of the 802.11i 4-way handshake
-
October 01-01, Philadelphia, PA
-
C He, J Mitchell, "Analysis of the 802.11i 4-way handshake", Proceedings of the 2004 ACM workshop on Wireless security, October 01-01, 2004, Philadelphia, PA
-
(2004)
Proceedings of the 2004 ACM workshop on Wireless security
-
-
He, C.1
Mitchell, J.2
-
15
-
-
50249179244
-
-
Website, April 10th, available HTTP
-
W. Slavin, "net stumbler dot com," [Website], 2007 April 10th, available HTTP: http://www.netstumbler.com/
-
(2007)
net stumbler dot com
-
-
Slavin, W.1
-
17
-
-
50249156550
-
-
& XP http://www.klcconsulting.net/Change_MAC_w2k.htm KLC Consulting
-
KLC Consulting (2003), "Change MAC Addresses on Windows 2000 & XP" http://www.klcconsulting.net/Change_MAC_w2k.htm
-
(2003)
Change MAC Addresses on Windows
, pp. 2000
-
-
-
18
-
-
33751038485
-
The Final Nail in WEP's Coffin
-
Washington, DC, USA, IEEE Computer Society
-
A. Bittau, M. Handley, and J. Lackey. "The Final Nail in WEP's Coffin" In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pages 386-400, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)
, pp. 386-400
-
-
Bittau, A.1
Handley, M.2
Lackey, J.3
-
19
-
-
50249146398
-
-
Techworld, 20 July
-
L. McKeag, "How to cope with ARP attacks on LANs," Techworld, 20 July. 2004; http://www.techworld.com/security/features/index.cfm?featureid= 727&Page=2&pagePos=3
-
(2004)
How to cope with ARP attacks on LANs
-
-
McKeag, L.1
-
20
-
-
9744233781
-
The implementation of a proactive wireless intrusion detection system
-
In The, 14-16 Sept
-
W Hsieh, C Lo, J Lee, T Huang. "The implementation of a proactive wireless intrusion detection system". In The Fourth International Conference on Computer and Information Technology. CIT '04. 14-16 Sept, pages 581-586, 2004.
-
(2004)
Fourth International Conference on Computer and Information Technology. CIT '04
, pp. 581-586
-
-
Hsieh, W.1
Lo, C.2
Lee, J.3
Huang, T.4
-
21
-
-
50249148452
-
-
Wikipedia [Website, April 10th available
-
th available: http://en.wikipedia.org/wiki/standard_normal_ table
-
(2007)
-
-
-
22
-
-
50249117212
-
-
Website, April 10th available
-
th available: http://www.wireshark.org
-
(2007)
-
-
-
23
-
-
50249132661
-
-
Website, April 10th available
-
th available: http://www.tamos.com/htmlhelp/commwifi
-
(2007)
-
-
CommView1
-
24
-
-
50249116835
-
-
th available: http://sourceforge.net/projects/wepdecrypt
-
th available: http://sourceforge.net/projects/wepdecrypt
-
-
-
|