-
2
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the USENIX Security Symposium, 2003, pp. 15 - 28.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
5
-
-
48049094399
-
Detecting and localizing wirelss spoofing attacks
-
May
-
Y. Chen, W. Trappe, and R. P. Martin, "Detecting and localizing wirelss spoofing attacks," in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007.
-
(2007)
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Chen, Y.1
Trappe, W.2
Martin, R.P.3
-
6
-
-
51349133236
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
April
-
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, "Detecting 802.11 MAC layer spoofing using received signal strength," in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008.
-
(2008)
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM)
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
7
-
-
26644439585
-
Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation
-
A. Wool, "Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation," ACM/Springer Wireless Networks, vol.11, no.6, pp. 677-686, 2005.
-
(2005)
ACM/Springer Wireless Networks
, vol.11
, Issue.6
, pp. 677-686
-
-
Wool, A.1
-
8
-
-
30744466949
-
Cryptographically generated addresses (cga)
-
IETF
-
T. Aura, "Cryptographically generated addresses (cga)," RFC 3972, IETF, 2005.
-
(2005)
RFC
, vol.3972
-
-
Aura, T.1
-
9
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing wireless systems via lower layer enforcements," in Proceedings of the ACM Workshop on Wireless Security (WiSe), 2006.
-
(2006)
Proceedings of the ACM Workshop on Wireless Security (WiSe)
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
10
-
-
33750288403
-
Mobility detection using everyday gsm traces
-
September
-
T. Sohn, A. Varshavsky, A. LaMarca, M. Y. Chen, T. Choudhury, I. Smith, S. Consolvo, J. Hightower, W. G. Griswold, and E. de Lara, "Mobility detection using everyday gsm traces," in UbiComp, September 2006, pp. 212-224.
-
(2006)
UbiComp
, pp. 212-224
-
-
Sohn, T.1
Varshavsky, A.2
Lamarca, A.3
Chen, M.Y.4
Choudhury, T.5
Smith, I.6
Consolvo, S.7
Hightower, J.8
Griswold, W.G.9
De Lara, E.10
-
11
-
-
67650655588
-
Sensing motion using spectral and spatial analysis of wlan rssi
-
October
-
K. Muthukrishnan, M. Lijding, N. Meratnia, and P. Havinga, "Sensing motion using spectral and spatial analysis of wlan rssi," in EuroSSC, October 2007.
-
(2007)
EuroSSC
-
-
Muthukrishnan, K.1
Lijding, M.2
Meratnia, N.3
Havinga, P.4
-
12
-
-
13244289949
-
Locadio: Inferring motion and location from wi-fi signal strengths
-
Aug
-
J. Krumm and E. Horvitz, "Locadio: inferring motion and location from wi-fi signal strengths," in MOBIQUITOUS, Aug 2004, pp. 4-13.
-
(2004)
MOBIQUITOUS
, pp. 4-13
-
-
Krumm, J.1
Horvitz, E.2
-
13
-
-
67650679773
-
Decode: Detecting co-moving wireless devices
-
G. Chandrasekaran, M. Ergin, M. Gruteser, R. Martin, J. Yang, and Y. Chen, "Decode: Detecting co-moving wireless devices," in Proceedings of the Fifth IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008.
-
(2008)
Proceedings of the Fifth IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
-
-
Chandrasekaran, G.1
Ergin, M.2
Gruteser, M.3
Martin, R.4
Yang, J.5
Chen, Y.6
-
14
-
-
51749108671
-
The impact of using multiple antennas on wireless localization
-
June
-
K. Kleisouris, Y. Chen, J. Yang, and R. P. Martin, "The impact of using multiple antennas on wireless localization," in Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June 2008.
-
(2008)
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Kleisouris, K.1
Chen, Y.2
Yang, J.3
Martin, R.P.4
-
15
-
-
0021404166
-
Mixture Densities, Maximum Likelihood and the em Algorithm
-
R. Redner and H. Walker, "Mixture Densities, Maximum Likelihood and the EM Algorithm," SIAM Review, vol.26, p. 195, 1984.
-
(1984)
SIAM Review
, vol.26
, pp. 195
-
-
Redner, R.1
Walker, H.2
-
17
-
-
0018306059
-
A threshold selection method from gray-level histograms
-
N. Otsu, "A threshold selection method from gray-level histograms," IEEE Transactions on Systems, Man, and Cybernetics, vol.9, no.1, pp. 62-66, 1979.
-
(1979)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.9
, Issue.1
, pp. 62-66
-
-
Otsu, N.1
-
19
-
-
21944444533
-
Segmentation using a regiongrowing thresholding
-
M. Mancas, B. Gosselin, and B. Macq, "Segmentation using a regiongrowing thresholding," in Proc. SPIE, vol.5672, 2005, pp. 388-398.
-
(2005)
Proc. SPIE
, vol.5672
, pp. 388-398
-
-
Mancas, M.1
Gosselin, B.2
MacQ, B.3
-
21
-
-
43849090040
-
A practical approach to landmark deployment for indoor localization
-
September
-
Y. Chen, J. Francisco, W. Trappe, and R. P. Martin, "A practical approach to landmark deployment for indoor localization," in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006.
-
(2006)
Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Chen, Y.1
Francisco, J.2
Trappe, W.3
Martin, R.P.4
-
22
-
-
70449581727
-
-
PRENTICE-HALL, INC., ENGLEWOOD CLIFFS, NJ 07632(USA)
-
I. Miller and J. Freund, "Probability and statistics for engineers," PRENTICE-HALL, INC., ENGLEWOOD CLIFFS, NJ 07632(USA), 1984, 530, 1984.
-
(1984)
Probability and Statistics for Engineers
, vol.530
, pp. 1984
-
-
Miller, I.1
Freund, J.2
|