-
1
-
-
0029461389
-
Transient analysis and genetic algorithms for classification
-
J. Toonstra and W. Kisner, "Transient analysis and genetic algorithms for classification," in Proc. IEEE WESCANEX, 1995.
-
(1995)
Proc. IEEE WESCANEX
-
-
Toonstra, J.1
Kisner, W.2
-
2
-
-
0035388827
-
Characteristics of radio transmitter fingerprints
-
K. Ellis and N. Serinken, "Characteristics of radio transmitter fingerprints," Radio Science, vol. 36, pp. 585-597, 2001.
-
(2001)
Radio Science
, vol.36
, pp. 585-597
-
-
Ellis, K.1
Serinken, N.2
-
3
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
-
J. Hall, M. Barbeau, and E. Kranakis, "Enhancing intrusion detection in wireless networks using radio frequency fingerprinting," in Proc. CIIT, 2004.
-
(2004)
Proc. CIIT
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
4
-
-
43949105260
-
Active behavioral fingerprinting of wireless devices
-
S. Bratus, C. Cornelius, D. Peebles, and D. Kotz, "Active behavioral fingerprinting of wireless devices," in Proc. ACM WiSec, 2008.
-
(2008)
Proc. ACM WiSec
-
-
Bratus, S.1
Cornelius, C.2
Peebles, D.3
Kotz, D.4
-
5
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting,
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Randwyk, and D. Sicker, "Passive data link layer 802.11 wireless device driver fingerprinting, " in Proc. USENIX, 2006.
-
(2006)
Proc. USENIX
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.5
Sicker, D.6
-
6
-
-
24344507334
-
Remote physical device fingerprinting
-
T. Kohno, A. Broido, and K. Claffy, "Remote physical device fingerprinting," IEEE TDSC, vol. 2, no. 2, 2005.
-
(2005)
IEEE TDSC
, vol.2
, Issue.2
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
7
-
-
71049148988
-
-
Nmap security scanner. http://www.insecure.org/nmap/2004
-
"Nmap security scanner." http://www.insecure.org/nmap/2004
-
-
-
-
8
-
-
71049194494
-
-
"Xprobe." http://www.sys-security.com
-
-
-
Xprobe1
-
10
-
-
0030357161
-
Wavelet based transmitter identification
-
R. Hippenstiel and Y. Payal, "Wavelet based transmitter identification," in Proc. ISSPA, 1996.
-
(1996)
Proc. ISSPA
-
-
Hippenstiel, R.1
Payal, Y.2
-
11
-
-
38049181728
-
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
-
J. Hall, M. Barbeau, and E. Kranakis, "Detecting rogue devices in bluetooth networks using radio frequency fingerprinting," in Proc. CCN, 2006.
-
(2006)
Proc. CCN
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
12
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," in Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
13
-
-
51349157157
-
Implications of radio fingerprinting on the security of sensor networks
-
K. Rassmussen and S. Capkun, "Implications of radio fingerprinting on the security of sensor networks," in Proc. SecureComm, 2007.
-
(2007)
Proc. SecureComm
-
-
Rassmussen, K.1
Capkun, S.2
-
14
-
-
34547363825
-
The sybil attack in sensor networks: Analysis and defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis and defenses," in Proc. IEEE IPSN, 2004.
-
(2004)
Proc. IEEE IPSN
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
15
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE S&P, 2005.
-
(2005)
Proc. IEEE S&P
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
17
-
-
10044297649
-
-
Springer
-
R. Bolle, J. Connell, S. Pankanti, N. Ratha, and A. Senior, Guide to Biometrics. Springer, 2003.
-
(2003)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
18
-
-
84876396478
-
IEEE 802.15.4 standard
-
"IEEE 802.15.4 standard," 2006.
-
(2006)
-
-
-
20
-
-
0031188771
-
Probabilistic visual learning for object representation
-
B. Moghaddam and A. Pentland, "Probabilistic visual learning for object representation," IEEE PAMI, vol. 19, no. 7, pp. 696-710, 1996.
-
(1996)
IEEE PAMI
, vol.19
, Issue.7
, pp. 696-710
-
-
Moghaddam, B.1
Pentland, A.2
-
21
-
-
84905372381
-
Discriminant analysis of principal components for face recognition
-
W. Zhao, R. Chellappa, and A. Krishnaswamy, "Discriminant analysis of principal components for face recognition," in Proc. Conf. on Automatic Face and Gesture Recognition, 1998, pp. 336-341.
-
(1998)
Proc. Conf. on Automatic Face and Gesture Recognition
, pp. 336-341
-
-
Zhao, W.1
Chellappa, R.2
Krishnaswamy, A.3
-
22
-
-
0035248924
-
Pca versus lda
-
A. Martinez and A. Kak, "Pca versus lda," IEEE PAMI, vol. 23, no. 2, pp. 228-233, 2001.
-
(2001)
IEEE PAMI
, vol.23
, Issue.2
, pp. 228-233
-
-
Martinez, A.1
Kak, A.2
-
23
-
-
34249822230
-
Wireless security through rf fingerprinting
-
Winter
-
O.Ureten and N.Serinken, "Wireless security through rf fingerprinting," Canadian J. Elect. Comput. Eng., vol. 32, no. 1, Winter 2007.
-
(2007)
Canadian J. Elect. Comput. Eng
, vol.32
, Issue.1
-
-
Ureten, O.1
Serinken, N.2
-
25
-
-
4043157158
-
An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions
-
O. Tekbas, N. Serinken, and O. Ureten, "An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions," Canadian J. Elect. Comput. Eng., vol. 29, no. 3, 2004.
-
(2004)
Canadian J. Elect. Comput. Eng
, vol.29
, Issue.3
-
-
Tekbas, O.1
Serinken, N.2
Ureten, O.3
-
26
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proc. ACM MobiCom, 2008.
-
(2008)
Proc. ACM MobiCom
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
27
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM MobiHoc, 2005.
-
(2005)
Proc. ACM MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
28
-
-
71049189349
-
-
Gnu software radio
-
"Gnu software radio." http://www.gnu.org/software/gnuradio/
-
-
-
-
29
-
-
50249175122
-
Jamming- resistant key establishment using uncoordinated frequency hopping
-
P
-
M. Strasser, C. Poepper, S. Capkun, and M. Cagalj, "Jamming- resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE S&P, 2008.
-
Proc. IEEE S&
, pp. 2008
-
-
Strasser, M.1
Poepper, C.2
Capkun, S.3
Cagalj, M.4
-
30
-
-
23044524214
-
Physical security devices for computer subsystems: A survey of attacks and defenses
-
S. Weingart, "Physical security devices for computer subsystems: A survey of attacks and defenses," in Proc. CHES, 2000.
-
(2000)
Proc. CHES
-
-
Weingart, S.1
-
32
-
-
76849097603
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. PerComm, 2005.
-
(2005)
Proc. PerComm
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
33
-
-
33646918331
-
Evaluation of security mechanisms in wireless sensor networks
-
G. Guimaraes, E. Souto, D. Sadok, and J. Kelner, "Evaluation of security mechanisms in wireless sensor networks," in Proc. Systems Communications, 2005.
-
(2005)
Proc. Systems Communications
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
34
-
-
51349089417
-
Waveform collection for use in wireless telephone identification,
-
U.S. Patent 5,999,806
-
D. Kaplan and D. Stanhope, "Waveform collection for use in wireless telephone identification," U.S. Patent 5,999,806, 1999.
-
(1999)
-
-
Kaplan, D.1
Stanhope, D.2
-
35
-
-
71049133194
-
Identification of the defective transmission devices using the wavelet transform
-
B. Wang, S. Omatu, and T. Abe, "Identification of the defective transmission devices using the wavelet transform," IEEE PAMI, vol. 27, no. 6, pp. 696-710, 2005.
-
(2005)
IEEE PAMI
, vol.27
, Issue.6
, pp. 696-710
-
-
Wang, B.1
Omatu, S.2
Abe, T.3
-
36
-
-
1242298616
-
Improvement of transmitter identification system for low snr transients
-
O. Tekbas, O. Ureten, and N. Serinken, "Improvement of transmitter identification system for low snr transients," in Electronic Letters, 2004.
-
(2004)
Electronic Letters
-
-
Tekbas, O.1
Ureten, O.2
Serinken, N.3
|