-
1
-
-
70450239506
-
RAP: Protecting commodity wi-fi networks from rogue access points
-
L. Ma, A. Y. Teymorian, X. Cheng, and M. Song, "RAP: Protecting commodity wi-fi networks from rogue access points," in QShine '07: Proceedings of the 4th international conference on Quality of service in heterogeneous wired/wireless networks, 2007.
-
(2007)
QShine '07: Proceedings of the 4th international conference on Quality of service in heterogeneous wired/wireless networks
-
-
Ma, L.1
Teymorian, A.Y.2
Cheng, X.3
Song, M.4
-
2
-
-
51349102127
-
-
Online, Available
-
"Gartner advises on security." [Online]. Available: http://www.gartner.com/5_about/press_releases/2001/pr20010809b.html
-
Gartner advises on security
-
-
-
3
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of rc4
-
London, UK: Springer-Verlag
-
S. R. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of rc4," in SAC '01: Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography. London, UK: Springer-Verlag, 2001, pp. 1-24.
-
(2001)
SAC '01: Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
4
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: the insecurity of 802.11," in MobiCom '01, 2001, pp. 180-189.
-
(2001)
MobiCom '01
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
5
-
-
0037766154
-
Security flaws in 802.11 data link protocols
-
N. Cam-Winget, R. Housley, D. Wagner, and J. Walker, "Security flaws in 802.11 data link protocols," Commun. ACM, vol. 46, no. 5, pp. 35-39, 2003.
-
(2003)
Commun. ACM
, vol.46
, Issue.5
, pp. 35-39
-
-
Cam-Winget, N.1
Housley, R.2
Wagner, D.3
Walker, J.4
-
9
-
-
11244291937
-
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
-
A. Adya, P. Bahl, R. Chandra, and L. Qiu, "Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks," in Mobi-Com '04, 2004, pp. 30-44.
-
(2004)
Mobi-Com '04
, pp. 30-44
-
-
Adya, A.1
Bahl, P.2
Chandra, R.3
Qiu, L.4
-
10
-
-
33748979867
-
Enhancing the security of corporate wi-fi networks using DAIR
-
New York, NY, USA: ACM Press
-
P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill, "Enhancing the security of corporate wi-fi networks using DAIR," in MobiSys 2006: Proceedings of the 4th international conference on Mobile systems, applications and services. New York, NY, USA: ACM Press, 2006, pp. 1-14.
-
(2006)
MobiSys 2006: Proceedings of the 4th international conference on Mobile systems, applications and services
, pp. 1-14
-
-
Bahl, P.1
Chandra, R.2
Padhye, J.3
Ravindranath, L.4
Singh, M.5
Wolman, A.6
Zill, B.7
-
11
-
-
18144401989
-
Rogue access point detection using temporal traffic characteristics
-
R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in GLOBECOM, 2004.
-
(2004)
GLOBECOM
-
-
Beyah, R.1
Kangude, S.2
Yu, G.3
Strickland, B.4
Copeland, J.5
-
12
-
-
47949122729
-
Rogue access point detection by analyzing network traffic characteristics
-
Orlando, Florida, October
-
S. Shetty, M. Song, and L. Ma, "Rogue access point detection by analyzing network traffic characteristics," in MILCOM, Orlando, Florida, October 2007.
-
(2007)
MILCOM
-
-
Shetty, S.1
Song, M.2
Ma, L.3
-
14
-
-
11244319474
-
A framework for wireless LAN monitoring and its applications
-
New York, NY, USA: ACM Press
-
J. Yeo, M. Youssef, and A. Agrawala, "A framework for wireless LAN monitoring and its applications," in WiSe '04: Pmceedings of the 2004 ACM workshop on Wireless security. New York, NY, USA: ACM Press, 2004, pp. 70-79.
-
(2004)
WiSe '04: Pmceedings of the 2004 ACM workshop on Wireless security
, pp. 70-79
-
-
Yeo, J.1
Youssef, M.2
Agrawala, A.3
-
15
-
-
42149159995
-
Passive online rogue access point detection using sequential hypothesis testing with tcp ack-pairs
-
New York, NY, USA: ACM
-
W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley, "Passive online rogue access point detection using sequential hypothesis testing with tcp ack-pairs," in IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. New York, NY, USA: ACM, 2007, pp. 365-378.
-
(2007)
IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
, pp. 365-378
-
-
Wei, W.1
Suh, K.2
Wang, B.3
Gu, Y.4
Kurose, J.5
Towsley, D.6
-
17
-
-
39349105309
-
Passive listening and intrusion management in commodity wi-fi networks
-
L. Ma, A. Y. Teymorian, and X. Cheng, "Passive listening and intrusion management in commodity wi-fi networks," in GLOBECOM, 2007.
-
(2007)
GLOBECOM
-
-
Ma, L.1
Teymorian, A.Y.2
Cheng, X.3
-
18
-
-
51349104860
-
-
P. Mateti, Hacking techniques in wireless networks. [On-line]. Available: http://www.cs.wright.edu/~pmateti/InternetSecurity/ Lectures/WirelessHacks/Mateti-WirelessHacks.htm
-
P. Mateti, "Hacking techniques in wireless networks." [On-line]. Available: http://www.cs.wright.edu/~pmateti/InternetSecurity/ Lectures/WirelessHacks/Mateti-WirelessHacks.htm
-
-
-
-
19
-
-
51349144472
-
-
ARP request replay attack, Online, Available
-
"ARP request replay attack." [Online]. Available: http://www.aircrack-ng.org/doku.php?id=arp-request_reinjection
-
-
-
-
20
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King, "Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities." in NDSS, 2006.
-
(2006)
NDSS
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
-
21
-
-
51349163004
-
-
Honeyclient project, Online, Available
-
"Honeyclient project." [Online]. Available: http://www.honeyclient.org/trac
-
-
-
-
24
-
-
39349099129
-
pOf: A versatile passive os fingerprinting tool
-
Online, Available
-
"pOf: a versatile passive os fingerprinting tool." [Online]. Available: http://lcamtuf.coredump.cx/p0f.shtml
-
-
-
-
25
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
Berkeley, CA, USA: USENIX Association
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker, "Passive data link layer 802.11 wireless device driver fingerprinting," in USENDC-SS'06: Pmceedings of the 15th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2006, pp. 12-12.
-
(2006)
USENDC-SS'06: Pmceedings of the 15th conference on USENIX Security Symposium
, pp. 12-12
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.V.5
Sicker, D.6
-
26
-
-
0031153399
-
WaveLAN-II: A high-performance wireless lan for the unlicensed band
-
A. Kamerman and L. Monteban, "WaveLAN-II: A high-performance wireless lan for the unlicensed band," Bell Labs Technical Journal, 1997.
-
(1997)
Bell Labs Technical Journal
-
-
Kamerman, A.1
Monteban, L.2
-
27
-
-
29244434632
-
Bit-rate selection in wireless networks,
-
Master's thesis, Massachusetts Institute of Technology
-
J. Bicket, "Bit-rate selection in wireless networks," Master's thesis, Massachusetts Institute of Technology, 2005.
-
(2005)
-
-
Bicket, J.1
-
29
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
N. Patwari and S. K. Kasera, "Robust location distinction using temporal link signatures," in MobiCom '07, 2007, pp. 111-122.
-
(2007)
MobiCom '07
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.K.2
-
32
-
-
79551627971
-
-
Downloaded from, Oct. 2006
-
M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, J. Zahorjan, and E. Lazowska, "CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17)" Downloaded from http://crawdad.cs.dartmouth.edu/uw/sigcomm2004, Oct. 2006.
-
CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17)
-
-
Rodrig, M.1
Reis, C.2
Mahajan, R.3
Wetherall, D.4
Zahorjan, J.5
Lazowska, E.6
-
33
-
-
37749006403
-
802.11 user fingerprinting
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting," in MobiCom '07, 2007, pp. 99-110.
-
(2007)
MobiCom '07
, pp. 99-110
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
34
-
-
14344265818
-
Internet traffic classification using bayesian analysis techniques
-
New York, NY, USA: ACM
-
A. W. Moore and D. Zuev, "Internet traffic classification using bayesian analysis techniques," in SIGMETRICS '05. New York, NY, USA: ACM, 2005, pp. 50-60.
-
(2005)
SIGMETRICS '05
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
38
-
-
51349146962
-
-
Online, Available
-
"Advanced 802.11 attack: Black hat 2002." [Online]. Available: http://www.blackhat.com/presentations/bh-usa-02/baird-lynn/bh-us-02-lynn-802. 11attack.ppt
-
(2002)
Advanced 802.11 attack: Black hat
-
-
|