-
1
-
-
62349101869
-
-
White Paper, Rogue Access Point Detection: Automatically Detect and Manage Wireless Threats to your Network. [Online] Available at http://www.proxim.com.
-
White Paper, Rogue Access Point Detection: Automatically Detect and Manage Wireless Threats to your Network. [Online] Available at http://www.proxim.com.
-
-
-
-
2
-
-
4544268957
-
A Flow-based Method for Abnormal Network Traffic Detection
-
Seoul
-
Rim, M-S., Kang, H.-J., Hung, S.-C., Chung, S.-H., and Hong, J.W., "A Flow-based Method for Abnormal Network Traffic Detection," IEEE/IFIP Network Operations and Management Symopsium, Seoul, 2004.
-
(2004)
IEEE/IFIP Network Operations and Management Symopsium
-
-
Rim, M.-S.1
Kang, H.-J.2
Hung, S.-C.3
Chung, S.-H.4
Hong, J.W.5
-
3
-
-
70450239506
-
RAP: Protecting Commodity Wi-fi Networks from Rogue Access Points
-
August, Vancouver, British Columbia
-
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng, Min Song, "RAP: Protecting Commodity Wi-fi Networks from Rogue Access Points," International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine), August 2007, Vancouver, British Columbia.
-
(2007)
International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine)
-
-
Ma, L.1
Teymorian, A.Y.2
Cheng, X.3
Song, M.4
-
6
-
-
11244291937
-
-
A. Adya, P Bahl, R. Chandra, and L. Qui, Architecture and techniques for diagnosing faults in IEEE 802.11 infrastruture networks, in MobiCom, 2004.
-
A. Adya, P Bahl, R. Chandra, and L. Qui, "Architecture and techniques for diagnosing faults in IEEE 802.11 infrastruture networks", in MobiCom, 2004.
-
-
-
-
7
-
-
33748979867
-
Enhancing the security of coporate wi-fi networks using DAIR
-
New York, NY
-
th International conference on Mobile systems, applications and services. New York, NY, 2006.
-
(2006)
th International conference on Mobile systems, applications and services
-
-
Bahl, P.1
Chandra, R.2
Padhye, J.3
Ravindranath, L.4
Singh, M.5
Wolman, A.6
Zill, B.7
-
8
-
-
18144401989
-
-
R. Beyah, S. Kangude, G. Yu, B. Stirckland, and J. Copeland, Rogue access point detection using temporal traffic characteristics, In proc. Of GLOBECOM, Dallas, TX, 2004.
-
R. Beyah, S. Kangude, G. Yu, B. Stirckland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," In proc. Of GLOBECOM, Dallas, TX, 2004.
-
-
-
-
9
-
-
62349103711
-
-
S. Shetty, M. Song, and L. Ma, Rogue access point detection analysing network traffic characterstics, in MILCOM, Orlando, Florida, October 2007.
-
S. Shetty, M. Song, and L. Ma, "Rogue access point detection analysing network traffic characterstics," in MILCOM, Orlando, Florida, October 2007.
-
-
-
-
10
-
-
42149159995
-
-
th ACM SIGCOMM conference on Internet measurement, New York, NY, 2007.
-
th ACM SIGCOMM conference on Internet measurement, New York, NY, 2007.
-
-
-
-
11
-
-
51249109756
-
-
H. Yin, G. Chen, and J. Wang, Detecting Protected Layer-3 Rogue APs, In Proc. Of the Fourth IEEE International Conference on Broadband Communications, Networks, and Systems, Raleigh, NC, September 2007.
-
H. Yin, G. Chen, and J. Wang, "Detecting Protected Layer-3 Rogue APs," In Proc. Of the Fourth IEEE International Conference on Broadband Communications, Networks, and Systems, Raleigh, NC, September 2007.
-
-
-
-
12
-
-
62349087439
-
-
N. Ye, A Markov chain model of temporal behaviour for anomaly detection, the IEEE Systems Man and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000.
-
N. Ye, "A Markov chain model of temporal behaviour for anomaly detection," the IEEE Systems Man and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000.
-
-
-
-
15
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb
-
Lawrence R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," In Proc of IEEE, Feb 1989.
-
(1989)
Proc of IEEE
-
-
Rabiner, L.R.1
-
16
-
-
15544363902
-
-
David K. Y. Yau, John C. S. Lui, Feng liang, Yeung Yam, Defending Against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles, IEEE/ACM Transactions on Networking, 2005.
-
David K. Y. Yau, John C. S. Lui, Feng liang, Yeung Yam, "Defending Against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles," IEEE/ACM Transactions on Networking, 2005.
-
-
-
|