-
1
-
-
33751038485
-
The Final Nail in WEP's Coffin
-
Oakland, CA, May
-
A. Bittau, M. Mandley, and J. Lackey. "The Final Nail in WEP's Coffin," Proc. IEEE Symp. Sec. and Privacy, Oakland, CA, May 2006, pp. 386-400.
-
(2006)
Proc. IEEE Symp. Sec. and Privacy
, pp. 386-400
-
-
Bittau, A.1
Mandley, M.2
Lackey, J.3
-
3
-
-
84925368904
-
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
-
Washington, DC, Aug
-
J. Bellardo and S. Savage. "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. 12th USENIX Sec. Symp., Washington, DC, Aug. 2003, pp. 15-28.
-
(2003)
Proc. 12th USENIX Sec. Symp
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
4
-
-
43449095315
-
Access Points Vulnerabilities to DoS Attacks in 802.11 Networks
-
M. Bernaschi, F. Ferreri, and L. Valcamonici, "Access Points Vulnerabilities to DoS Attacks in 802.11 Networks," Wireless Networks, vol.14, no. 2, 2008, pp. 159-69.
-
(2008)
Wireless Networks
, vol.14
, Issue.2
, pp. 159-169
-
-
Bernaschi, M.1
Ferreri, F.2
Valcamonici, L.3
-
5
-
-
54849429253
-
-
Fake AP; http://www.blackalchemy.to/project/fakeap
-
-
-
Fake, A.P.1
-
6
-
-
51249109756
-
Detecting Protected Layer-3 rogue APs
-
Raleigh, NC, Sept
-
H. Yin, G. Chen, and J. Wang. "Detecting Protected Layer-3 rogue APs," Proc. IEEE BROADNETS '07, Raleigh, NC, Sept. 2007.
-
(2007)
Proc. IEEE BROADNETS '07
-
-
Yin, H.1
Chen, G.2
Wang, J.3
-
7
-
-
43949105260
-
Active Behavioral Fingerprinting of Wireless Devices
-
Mar
-
S. Bratus et al., "Active Behavioral Fingerprinting of Wireless Devices." Proc First ACM Conf. Wireless Network Sec., Mar. 2008, pp. 56-61.
-
(2008)
Proc First ACM Conf. Wireless Network Sec
, pp. 56-61
-
-
Bratus, S.1
-
8
-
-
33750825847
-
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
-
Dec
-
M. Raya, J. - P. Mubaux, and I. Aad. "DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots," IEEE Trans. Mobile Computing, vol. 5, no. 12, Dec. 2006, pp. 1691-1705.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, Issue.12
, pp. 1691-1705
-
-
Raya, M.1
Mubaux, J.P.2
Aad, I.3
-
9
-
-
33748979867
-
Enhancing the Security of Corporate WiFi Networks Using DAIR
-
Uppsala, Sweden, June
-
P. Bahl et al., "Enhancing the Security of Corporate WiFi Networks Using DAIR," Proc. MobiSys 2006, Uppsala, Sweden, June 2006, pp. 1-14.
-
(2006)
Proc. MobiSys 2006
, pp. 1-14
-
-
Bahl, P.1
-
10
-
-
50649119321
-
Channel Sampling Strategies for Monitoring Wireless Networks
-
Boston, MA, Apr
-
U. Deshpande, T. Henderson, and D. Kotz. "Channel Sampling Strategies for Monitoring Wireless Networks," Proc. WiNMee 2006, Boston, MA, Apr. 2006.
-
(2006)
Proc. WiNMee 2006
-
-
Deshpande, U.1
Henderson, T.2
Kotz, D.3
-
12
-
-
51349133236
-
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength
-
Apr
-
Y. Sheng et al., "Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength," Proc. IEEE INFOCOM, Apr. 2008, pp. 1768-76.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1768-1776
-
-
Sheng, Y.1
-
14
-
-
43949116598
-
Refocusing in 802.11 Wireless Measurement
-
Proc. Passive and Active Measurement Conf, Springer-Verlag, Apr
-
U. Deshpande, C. McDonald, and D. Kotz. "Refocusing in 802.11 Wireless Measurement," Proc. Passive and Active Measurement Conf., LNCS, vol. 4979, Springer-Verlag, Apr. 2008, pp. 142-51.
-
(2008)
LNCS
, vol.4979
, pp. 142-151
-
-
Deshpande, U.1
McDonald, C.2
Kotz, D.3
-
15
-
-
33750349737
-
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis
-
Pisa, Italy, Sept
-
Y.-C. Cheng et al., "Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis," Proc. SIGCOMM '06, Pisa, Italy, Sept. 2006, pp. 39-50.
-
(2006)
Proc. SIGCOMM '06
, pp. 39-50
-
-
Cheng, Y.-C.1
-
16
-
-
33750343549
-
Analyzing the MAC-Level Behavior of Wireless Networks in the Wild
-
Pisa, Italy, Sept
-
R. Mahajan et al., "Analyzing the MAC-Level Behavior of Wireless Networks in the Wild," Proc. SIGCOMM '06, Pisa, Italy, Sept. 2006, pp. 75-86.
-
(2006)
Proc. SIGCOMM '06
, pp. 75-86
-
-
Mahajan, R.1
|