-
1
-
-
56749180320
-
Active behavioral fingerprinting of wireless devices
-
Tech. Report TR2008-610, Institute for Security Technology Studies, Dartmouth College, Mar
-
S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, "Active behavioral fingerprinting of wireless devices", Tech. Report TR2008-610, Institute for Security Technology Studies, Dartmouth College, Mar. 2006.
-
(2006)
-
-
Bratus, S.1
Cornelius, C.2
Kotz, D.3
Peebles, D.4
-
2
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
June
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Randwyk, and D. Sicker, "Passive data link layer 802.11 wireless device driver fingerprinting" , in Proc. USENIX Annual Technical Conference, June 2006, pp. 1-12.
-
(2006)
Proc. USENIX Annual Technical Conference
, pp. 1-12
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.5
Sicker, D.6
-
3
-
-
27544460278
-
Remote physical device fingerprinting
-
T. Kohno, A. Broido, and K. C. Claffy, "Remote physical device fingerprinting", IEEE Trans. Dependable and Secure Commun., vol. 2, no. 2, pp. 93-108, 2005.
-
(2005)
IEEE Trans. Dependable and Secure Commun
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
4
-
-
34249822230
-
Wireless security through RF fingerprinting
-
Winter
-
O. Ureten and N. Serinken, "Wireless security through RF fingerprinting", Canadian J. Elect. Comp. Eng., vol. 32, no. 1, pp. 27-33, Winter 2007.
-
(2007)
Canadian J. Elect. Comp. Eng
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
5
-
-
51349089007
-
Using transceiverprints for anomaly based intrusion detection
-
Nov
-
J. Hall, M. Barbeau, and E. Kranakis, "Using transceiverprints for anomaly based intrusion detection", in Proc. 3rd IASTED Int. Conf. Comm, Internet and Info Technology (CUT), Nov. 2004.
-
(2004)
Proc. 3rd IASTED Int. Conf. Comm, Internet and Info Technology (CUT)
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
7
-
-
0033326545
-
Detection of radio transmitter turn-on transients
-
Nov
-
O. Ureten and N. Serinken, "Detection of radio transmitter turn-on transients", IEE Electron. Lett., vol. 35, no. 23, pp. 1996-1997, Nov. 1999.
-
(1999)
IEE Electron. Lett
, vol.35
, Issue.23
, pp. 1996-1997
-
-
Ureten, O.1
Serinken, N.2
-
8
-
-
16244402347
-
Bayesian detection of WiFi transmitter RF fingerprints
-
Mar
-
O. Ureten and N. Serinken, "Bayesian detection of WiFi transmitter RF fingerprints", IEE Electron. Lett., vol. 41, no. 6, pp. 373-374, Mar. 2005.
-
(2005)
IEE Electron. Lett
, vol.41
, Issue.6
, pp. 373-374
-
-
Ureten, O.1
Serinken, N.2
-
9
-
-
0033715327
-
Generalised dimension characterization of radio transmitter turn-on transients
-
June
-
N. Serinken and O. Ureten, "Generalised dimension characterization of radio transmitter turn-on transients", IEE Electron. Lett., vol. 36, no. 12, pp. 1064-1064, June 2000.
-
(2000)
IEE Electron. Lett
, vol.36
, Issue.12
, pp. 1064-1064
-
-
Serinken, N.1
Ureten, O.2
-
10
-
-
0035388827
-
Characteristics of radio transmitter fingerprints
-
K. J. Ellis and N. Serinken, "Characteristics of radio transmitter fingerprints", Radio Science, vol. 36, no. 4, pp. 585-597, 2001.
-
(2001)
Radio Science
, vol.36
, Issue.4
, pp. 585-597
-
-
Ellis, K.J.1
Serinken, N.2
-
11
-
-
48049094399
-
Detecting and localizing wireless spoofing attacks
-
June
-
Y. Chen, W. Trappe, and R. Martin, "Detecting and localizing wireless spoofing attacks", in Proc. IEEE Conf. Sensor, Mesh and Ad Hoc Comm and Nets (SECON), June 2007, pp. 193-202.
-
(2007)
Proc. IEEE Conf. Sensor, Mesh and Ad Hoc Comm and Nets (SECON)
, pp. 193-202
-
-
Chen, Y.1
Trappe, W.2
Martin, R.3
-
12
-
-
51349133236
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
Apr
-
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, "Detecting 802.11 MAC layer spoofing using received signal strength", in Proc. IEEE INFO-COM, Apr. 2008, pp. 1768-1776.
-
(2008)
Proc. IEEE INFO-COM
, pp. 1768-1776
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
13
-
-
85161711734
-
Implications of radio fingerprinting on the security of sensor networks
-
Security and Privacy in Communication Networks ICST, Sept
-
B. Danev and S. Kapkun, "Implications of radio fingerprinting on the security of sensor networks", in Proc. 3rd Int. Conf. Security and Privacy in Communication Networks (ICST), Sept. 2007, pp. 1-5.
-
(2007)
Proc. 3rd Int. Conf
, pp. 1-5
-
-
Danev, B.1
Kapkun, S.2
-
14
-
-
67249127027
-
Using spectral fingerprints to improve wireless network security
-
Nov
-
W. C. Suski, M. A. Temple, M. J. Mendenhall, and R. F. Mills", Using spectral fingerprints to improve wireless network security", in Proc. IEEE CLOBECOM, Nov. 2008, pp. 1-5.
-
(2008)
Proc. IEEE CLOBECOM
, pp. 1-5
-
-
Suski, W.C.1
Temple, M.A.2
Mendenhall, M.J.3
Mills", R.F.4
-
15
-
-
55449093152
-
Radio frequency fingerprinting commercial communication devices to enhance electronic security
-
W. C. Suski, M. A. Temple, M. J. Mendenhall, and R. F. Mills, "Radio frequency fingerprinting commercial communication devices to enhance electronic security", Int. J. Electronic Security and Digital Forensics, vol. 1, no. 3, pp. 301-322, 2008.
-
(2008)
Int. J. Electronic Security and Digital Forensics
, vol.1
, Issue.3
, pp. 301-322
-
-
Suski, W.C.1
Temple, M.A.2
Mendenhall, M.J.3
Mills, R.F.4
-
16
-
-
71049178173
-
Transient-based identification of wireless sensor nodes
-
Information Processing in Sensor Networks IPSN, Apr
-
B. Danev and S. Kapkun, 'Transient-based identification of wireless sensor nodes", in Proc. the ACM/IEEE Int. Conf. Information Processing in Sensor Networks (IPSN), Apr. 2009, pp. 25-36.
-
(2009)
Proc. the ACM/IEEE Int. Conf
, pp. 25-36
-
-
Danev, B.1
Kapkun, S.2
-
17
-
-
70449496191
-
Sensitivity analysis of burst detection and RF fingerprinting classification performance
-
June
-
R. W. Klein, M. A. Temple, M. J. Mendenhall, and D. R. Reising, "Sensitivity analysis of burst detection and RF fingerprinting classification performance", in Proc. IEEE ICC, June 2009, pp. 1-5.
-
(2009)
Proc. IEEE ICC
, pp. 1-5
-
-
Klein, R.W.1
Temple, M.A.2
Mendenhall, M.J.3
Reising, D.R.4
-
18
-
-
74549117449
-
Application of wavelet denoising to improve OFDM-based signal detection and classification"
-
R. W. Klein, M. A. Temple, and M. J. Mendenhall, "Application of wavelet denoising to improve OFDM-based signal detection and classification", J. Security and Communication Networks, Special Issue: Security in Next Generation Wireless Networks, vol. 2, no. 6, 2009.
-
(2009)
J. Security and Communication Networks, Special Issue: Security in Next Generation Wireless Networks
, vol.2
, Issue.6
-
-
Klein, R.W.1
Temple, M.A.2
Mendenhall, M.J.3
-
19
-
-
39349110034
-
Improved coarse timing for burst mode OFDM
-
Nov
-
O. Ureten and N. Serinken, "Improved coarse timing for burst mode OFDM", in Proc. IEEE GLOBECOM, Nov. 2007, pp. 2841-2846.
-
(2007)
Proc. IEEE GLOBECOM
, pp. 2841-2846
-
-
Ureten, O.1
Serinken, N.2
-
20
-
-
33751343721
-
Bayesian frame synchronization for 802.11a WLANs: Experimental results
-
May
-
O. Ureten, R. A. Pacheco, N. Serinken, and D. Hatzinakos, "Bayesian frame synchronization for 802.11a WLANs: Experimental results", in Proc. Canadian Conf. Electrical and Computer Engineering (CCECE), May 2005, pp. 884-887.
-
(2005)
Proc. Canadian Conf. Electrical and Computer Engineering (CCECE)
, pp. 884-887
-
-
Ureten, O.1
Pacheco, R.A.2
Serinken, N.3
Hatzinakos, D.4
-
21
-
-
23744492266
-
Bayesian frame synchronization using periodic preamble for OFDM-based WLANs
-
July
-
R. A. Pacheco, O. Ureten, D. Hatzinakos, and N. Serinken, "Bayesian frame synchronization using periodic preamble for OFDM-based WLANs", IEEE Signal Process. Lett., vol. 12, no. 7, pp. 524-527, July 2005.
-
(2005)
IEEE Signal Process. Lett
, vol.12
, Issue.7
, pp. 524-527
-
-
Pacheco, R.A.1
Ureten, O.2
Hatzinakos, D.3
Serinken, N.4
-
22
-
-
13844296408
-
Cognitive radio: Brain-empowered wireless communications
-
Feb
-
S. Haykin, "Cognitive radio: Brain-empowered wireless communications", IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.
-
(2005)
IEEE J. Sel. Areas Commun
, vol.23
, Issue.2
, pp. 201-220
-
-
Haykin, S.1
-
23
-
-
14244253994
-
CS-OFDMA: A new wireless CDD physical layer scheme
-
Feb
-
W. C. Y. Lee, "CS-OFDMA: A new wireless CDD physical layer scheme", IEEE Commun. Mag., vol. 43, no. 2, pp. 74-79, Feb. 2005.
-
(2005)
IEEE Commun. Mag
, vol.43
, Issue.2
, pp. 74-79
-
-
Lee, W.C.Y.1
-
24
-
-
13244299284
-
A vision from the future: Beyond 3G TDD
-
Jan
-
P. Zhang, X. Tao, J. Zhang, Y. Wang, and Y. Wang, "A vision from the future: Beyond 3G TDD", IEEE Commun. Mag., vol. 43, no. 1, pp. 38-44, Jan 2005.
-
(2005)
IEEE Commun. Mag
, vol.43
, Issue.1
, pp. 38-44
-
-
Zhang, P.1
Tao, X.2
Zhang, J.3
Wang, Y.4
Wang, Y.5
-
28
-
-
1242298616
-
Improvement of transmitter identification system for low SNR transients
-
Feb
-
O. H. Tekbas, O. Ureten, and N. Serinken, "Improvement of transmitter identification system for low SNR transients", IEE Electron. Lett., vol. 40, no. 3, pp. 182-183, Feb. 2004.
-
(2004)
IEE Electron. Lett
, vol.40
, Issue.3
, pp. 182-183
-
-
Tekbas, O.H.1
Ureten, O.2
Serinken, N.3
-
29
-
-
4043157158
-
An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions
-
July
-
O. H. Tekbas, N. Serinken, and O. Ureten, "An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions", Canadian J. Electrical and Computer Engineering, vol. 29, no. 3, pp. 203-209, July 2004.
-
(2004)
Canadian J. Electrical and Computer Engineering
, vol.29
, Issue.3
, pp. 203-209
-
-
Tekbas, O.H.1
Serinken, N.2
Ureten, O.3
-
30
-
-
0029461389
-
Transient analysis and genetic algorithms for classification
-
May
-
J. Toonstra and W. Kinsner, 'Transient analysis and genetic algorithms for classification", in Proc. IEEE WESCANEX: Communications, Power, and Computing, May 1995, pp. 432-437.
-
(1995)
Proc. IEEE WESCANEX: Communications, Power, and Computing
, pp. 432-437
-
-
Toonstra, J.1
Kinsner, W.2
-
31
-
-
0029231097
-
Wavelet transform use for signal classification by self-organizing neural networks
-
June
-
A. Prochazka and M. Storek, "Wavelet transform use for signal classification by self-organizing neural networks", in Proc. Int. Conf. Artificial Neural Networks, June 1995, pp. 295-299.
-
(1995)
Proc. Int. Conf. Artificial Neural Networks
, pp. 295-299
-
-
Prochazka, A.1
Storek, M.2
-
32
-
-
60149084101
-
Detection of rogue devices in wireless networks
-
Ph. D. Thesis, School of Computer Science, Carleton University, Aug
-
J. Hall, "Detection of rogue devices in wireless networks", Ph. D. Thesis, School of Computer Science, Carleton University, Aug. 2006.
-
(2006)
-
-
Hall, J.1
-
34
-
-
44849125344
-
On the dual-tree complex wavelet packet and M-band transforms
-
June
-
I. Bayram and I. W. Selesnick, "On the dual-tree complex wavelet packet and M-band transforms", IEEE Trans. Signal Process., vol. 56, no. 6, pp. 2298-2310, June 2008.
-
(2008)
IEEE Trans. Signal Process
, vol.56
, Issue.6
, pp. 2298-2310
-
-
Bayram, I.1
Selesnick, I.W.2
-
35
-
-
0000764772
-
The use of multiple measurements in taxonomic problems
-
R. A. Fisher, "The use of multiple measurements in taxonomic problems", Annals of Eugenics, vol. 7, pp. 179-188, 1936.
-
(1936)
Annals of Eugenics
, vol.7
, pp. 179-188
-
-
Fisher, R.A.1
-
36
-
-
0003922190
-
-
2nd ed, John Wiley & Sons, Inc, New York
-
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, 2nd ed., John Wiley & Sons, Inc.: New York, 2001.
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
37
-
-
85161709664
-
-
Masters Thesis, Naval Post Graduate School, Mar
-
J. A. Pitta, R. D. Hippenstiel, and M. P. Fargues, 'Transient detection using wavelets", Masters Thesis, Naval Post Graduate School, Mar. 1995.
-
(1995)
Transient detection using wavelets
-
-
Pitta, J.A.1
Hippenstiel, R.D.2
Fargues, M.P.3
-
38
-
-
85032751971
-
The dual-tree complex wavelet transform
-
Nov
-
I. W. Selesnick, R. G. Baraniuk, and N. C. Kingsbury, "The dual-tree complex wavelet transform", IEEE Signal Process. Mag., vol. 22, no. 6, pp. 123-151, Nov. 2005.
-
(2005)
IEEE Signal Process. Mag
, vol.22
, Issue.6
, pp. 123-151
-
-
Selesnick, I.W.1
Baraniuk, R.G.2
Kingsbury, N.C.3
-
40
-
-
85161713681
-
-
I. W. Selesnick, Wavelet Software at Polytechnic University, Brooklyn, NY, [Online]. Available. http://taco.poly.edu/WaveletSoftware/
-
I. W. Selesnick, Wavelet Software at Polytechnic University, Brooklyn, NY, [Online]. Available. http://taco.poly.edu/WaveletSoftware/
-
-
-
-
42
-
-
85161682606
-
-
IEEE Computer Society. IEEE Std 802.11-2007, June 2007.
-
IEEE Computer Society. IEEE Std 802.11-2007, June 2007.
-
-
-
-
43
-
-
0003684449
-
-
Springer: NY
-
T. Hastie, R. Tibshirani, and J. Friedman, Data Mining, Inference, and Prediction, Springer: NY, 2001.
-
(2001)
Data Mining, Inference, and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
45
-
-
42549151882
-
Relevance-based feature extraction for hyperspectral images
-
Apr
-
M. J. Mendenhall and E. Merenyi, "Relevance-based feature extraction for hyperspectral images", IEEE Trans. Neural Netw., vol. 19, no. 4, pp. 658-672, Apr. 2008.
-
(2008)
IEEE Trans. Neural Netw
, vol.19
, Issue.4
, pp. 658-672
-
-
Mendenhall, M.J.1
Merenyi, E.2
-
46
-
-
84869041830
-
Generalized relevance learning vector quantization for classification-driven feature extraction from hyperspectral data
-
May
-
M. J. Mendenhall and E. Merenyi, "Generalized relevance learning vector quantization for classification-driven feature extraction from hyperspectral data", in Proc. American Society for Photogrammetry and Remote Sensing, May 2006.
-
(2006)
Proc. American Society for Photogrammetry and Remote Sensing
-
-
Mendenhall, M.J.1
Merenyi, E.2
|