-
1
-
-
60349090885
-
-
IEEE Standard 802.11 - wireless LAN medium access control (MAC) and physical layer (PHY) specifications. The Institute of Electrical and Electronics Engineers, Inc., 1999.
-
IEEE Standard 802.11 - wireless LAN medium access control (MAC) and physical layer (PHY) specifications. The Institute of Electrical and Electronics Engineers, Inc., 1999.
-
-
-
-
4
-
-
60349126487
-
-
Intel PRD/Wireless 3945ABG Driver for Linux, http://ipw3945.sourceforge. net/.
-
Intel PRD/Wireless 3945ABG Driver for Linux, http://ipw3945.sourceforge. net/.
-
-
-
-
8
-
-
84868886462
-
-
AirMagnet, http://www.airmagnet.com.
-
AirMagnet
-
-
-
11
-
-
84868874988
-
-
DD-WRT
-
DD-WRT, http://www.dd-wrt.com.
-
-
-
-
12
-
-
60349093412
-
-
Network Time Protocol version 4 reference and implementation guide, http://www.eecis.udel.edu/emills/database/reports/ntp4/ntp4.pdf.
-
Network Time Protocol version 4 reference and implementation guide, http://www.eecis.udel.edu/emills/database/reports/ntp4/ntp4.pdf.
-
-
-
-
14
-
-
84870578392
-
-
NetStumbler, http://www.netstumbler.com.
-
NetStumbler
-
-
-
16
-
-
60349110791
-
-
tcpdump, http://www.tcpdump.org/.
-
tcpdump, http://www.tcpdump.org/.
-
-
-
-
17
-
-
11244291937
-
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
-
A. Adya, P. Bahl, and R. C. et al. Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks. In MobiCom '04, pages 30-44, 2004.
-
(2004)
MobiCom '04
, pp. 30-44
-
-
Adya, A.1
Bahl, P.2
-
18
-
-
33748979867
-
Enhancing the security of corporate Wi-Fi networks using DAIR
-
P. Bahl, R. Chandra, and J. P. et al. Enhancing the security of corporate Wi-Fi networks using DAIR. In MobiSys '06, pages 1-14, 2006.
-
(2006)
MobiSys '06
, pp. 1-14
-
-
Bahl, P.1
Chandra, R.2
-
19
-
-
33646203821
-
Generalizing the hough transform to detect arbitrary shapes
-
D. H. Ballard. Generalizing the hough transform to detect arbitrary shapes. Readings in computer vision: issues, problems, principles, and paradigms, pages 714-725, 1987.
-
(1987)
Readings in computer vision: Issues, problems, principles, and paradigms
, pp. 714-725
-
-
Ballard, D.H.1
-
20
-
-
18144401989
-
Rogue access point detection using temporal traffic characteristics
-
December
-
R. Beyah, S. Kangude, and G. Y. et al. Rogue access point detection using temporal traffic characteristics. In Proceedings of IEEE GLOBECOM, December 2004.
-
(2004)
Proceedings of IEEE GLOBECOM
-
-
Beyah, R.1
Kangude, S.2
-
21
-
-
0002629270
-
Maximum likelihood from incomplete data via the EM algorithm
-
A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, 39(1):1-38, 1977.
-
(1977)
Journal of the Royal Statistical Society
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
22
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting. In USENIX-SS'06
-
Berkeley, CA, USA, USENIX Association
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 12-12, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the 15th conference on USENIX Security Symposium
, pp. 12-12
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.V.5
Sicker, D.6
-
23
-
-
85143166035
-
Security analysis and improvements for IEEE 802.Hi
-
C. He and J. C. Mitchell. Security analysis and improvements for IEEE 802.Hi. In NDSS, 2005.
-
(2005)
NDSS
-
-
He, C.1
Mitchell, J.C.2
-
24
-
-
0003761433
-
Method and means for recognizing complex patterns
-
U.S. Patent 3069654
-
P. Hough. Method and means for recognizing complex patterns. U.S. Patent 3069654, 1962.
-
(1962)
-
-
Hough, P.1
-
25
-
-
24344507334
-
Remote physical device fingerprinting
-
T. Kohno, A. Broido, and K. C. Claffy. Remote physical device fingerprinting. IEEE Trans. Dependable Secur. Comput, 2(2):93-108, 2005.
-
(2005)
IEEE Trans. Dependable Secur. Comput
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
26
-
-
85022192331
-
Ripps: Rogue identifying packet payload sheer detecting unauthorized wireless hosts through network traffic conditioning
-
C. Mano, A. Blaich, and Q. L. et al. Ripps: Rogue identifying packet payload sheer detecting unauthorized wireless hosts through network traffic conditioning. A CM Transactions on Information and System Security, 2007.
-
(2007)
A CM Transactions on Information and System Security
-
-
Mano, C.1
Blaich, A.2
-
27
-
-
33244479152
-
Estimation and removal of clock skew from network delay measurements
-
Technical report, Amherst, MA, USA
-
S. B. Moon, P. Skelly, and D. Towsley. Estimation and removal of clock skew from network delay measurements. Technical report, Amherst, MA, USA, 1998.
-
(1998)
-
-
Moon, S.B.1
Skelly, P.2
Towsley, D.3
-
28
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
New York, NY, USA, ACM
-
S. J. Murdoch. Hot or not: revealing hidden services by their clock skew. In CCS '06, pages 27-36, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06
, pp. 27-36
-
-
Murdoch, S.J.1
-
30
-
-
60349101689
-
-
M. Rodrig, C. Reis, and R. M. et al. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth.edu/uw/sigcomm2004, Oct. 2006.
-
M. Rodrig, C. Reis, and R. M. et al. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth.edu/uw/sigcomm2004, Oct. 2006.
-
-
-
-
31
-
-
60349085550
-
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
-
W. Wei, K. Suh, and B. W. et al. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In IMC, pages 93-108, 2007.
-
(2007)
IMC
, pp. 93-108
-
-
Wei, W.1
Suh, K.2
-
32
-
-
33845307812
-
Randomized Hough transform (RHT): Basic mechanisms, algorithms, and computational complexities
-
L. Xu and E. Oja. Randomized Hough transform (RHT): basic mechanisms, algorithms, and computational complexities. CVGIP: Image Underst., 57(2):131-154, 1993.
-
(1993)
CVGIP: Image Underst
, vol.57
, Issue.2
, pp. 131-154
-
-
Xu, L.1
Oja, E.2
|