-
1
-
-
67349220971
-
Wireless access points and ARP poisoning: wireless vulnerabilities that expose the wired network
-
Fleck B., and Dimov J. Wireless access points and ARP poisoning: wireless vulnerabilities that expose the wired network. White Paper (12/10/2001)
-
(2001)
White Paper
-
-
Fleck, B.1
Dimov, J.2
-
4
-
-
4544221258
-
"Access points vulnerabilities to DoS attacks in 802.11 networks"
-
Bernaschi N., Ferreri F., and Valcamonici L. "Access points vulnerabilities to DoS attacks in 802.11 networks". Wireless Networks (2004) 634-638
-
(2004)
Wireless Networks
, pp. 634-638
-
-
Bernaschi, N.1
Ferreri, F.2
Valcamonici, L.3
-
7
-
-
24944551633
-
TDOA location system for 802.11b WLAN
-
Yamasaki R., Ogino A., Tamaki T., Uta T., Matsuzawa N., and Kato T. TDOA location system for 802.11b WLAN. Proceedings of the IEEE WCNC (2005) 2338-2343
-
(2005)
Proceedings of the IEEE WCNC
, pp. 2338-2343
-
-
Yamasaki, R.1
Ogino, A.2
Tamaki, T.3
Uta, T.4
Matsuzawa, N.5
Kato, T.6
-
10
-
-
33745062882
-
Jamming in sensor networks: attack and defense strategies
-
Xu W., Ma K., Trappe W., and Zhang Y. Jamming in sensor networks: attack and defense strategies. IEEE Network 20 (2006) 41-47
-
(2006)
IEEE Network
, vol.20
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
15
-
-
33745636711
-
Detecting wireless LAN MAC address spoofing
-
Wright J. Detecting wireless LAN MAC address spoofing. white paper (1/21/2003)
-
(2003)
white paper
-
-
Wright, J.1
-
16
-
-
67349167940
-
-
RFC 5201 - Host Identity Protocol (HIP), available at http://www.ietf.org/rfc/rfc5201.txt.
-
RFC 5201 - Host Identity Protocol (HIP), available at http://www.ietf.org/rfc/rfc5201.txt.
-
-
-
-
17
-
-
52049085664
-
Wireless client puzzles in IEEE 802.11 networks: security by wireless
-
Martinovic I., Zdarsky F.A., Wilhelm M., Wegmann C., and Schmitt J.B. Wireless client puzzles in IEEE 802.11 networks: security by wireless. Proceedings of the First ACM Conference on Wireless Network Security (WISEC 2008) (2008) 36-45
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security (WISEC 2008)
, pp. 36-45
-
-
Martinovic, I.1
Zdarsky, F.A.2
Wilhelm, M.3
Wegmann, C.4
Schmitt, J.B.5
-
18
-
-
33745663748
-
Sequence number-based MAC address spoof detection
-
Proceedings of 8th Recent Advances in Intrusion Detection Symposium (RAID 2005), Springer
-
Guo F., and Chiueh T. Sequence number-based MAC address spoof detection. Proceedings of 8th Recent Advances in Intrusion Detection Symposium (RAID 2005). LNCS vol. 3858 (2006), Springer 309-329
-
(2006)
LNCS
, vol.3858
, pp. 309-329
-
-
Guo, F.1
Chiueh, T.2
-
20
-
-
43949084058
-
Malware in IEEE 802.11 wireless networks
-
Proceedings of 9th International Conference on Passive and Active Network Measurement (PAM 2008), Springer
-
Stone-Gross B., Wilson C., Almeroth K.C., Belding E.M., Zheng H., and Papagiannaki K. Malware in IEEE 802.11 wireless networks. Proceedings of 9th International Conference on Passive and Active Network Measurement (PAM 2008). LNCS 4979 (2008), Springer 222-231
-
(2008)
LNCS
, vol.4979
, pp. 222-231
-
-
Stone-Gross, B.1
Wilson, C.2
Almeroth, K.C.3
Belding, E.M.4
Zheng, H.5
Papagiannaki, K.6
|