-
1
-
-
77951281566
-
-
Online. Available
-
Cisco, "German hospital leads with 802.11n mobility," 2009. [Online]. Available: http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ ps6973/case-study c36-522101.pdf
-
(2009)
German Hospital Leads with 802.11n Mobility
-
-
-
3
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Revised Papers from the Springer-Verlag, [Online]. Available
-
S. R. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," in Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography. Springer-Verlag, 2001, pp. 1-24. [Online]. Available: http://portal.acm.org/citation.cfm?id=646557. 694759
-
(2001)
8th Annual International Workshop on Selected Areas in Cryptography
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
4
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Rome, Italy: ACM, [Online]. Available
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: the insecurity of 802.11," in Proceedings of the 7th annual international conference on Mobile computing and networking. Rome, Italy: ACM, 2001, pp. 180-189. [Online]. Available: http://portal.acm.org/citation.cfm?id= 381695
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
5
-
-
84889956484
-
Using the fluhrer, mantin, and shamir attack to break WEP
-
The Internet Society
-
A. Stubblefield, J. Ioannidis, and A. D. Rubin, "Using the fluhrer, mantin, and shamir attack to break WEP," in Network and Distributed System Security Symposium (NDSS). The Internet Society, 2002.
-
(2002)
Network and Distributed System Security Symposium (NDSS)
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
6
-
-
0036980638
-
Your 802.11 wireless network has no clothes
-
W. Arbaugh, N. Shankar, Y. Wan, and K. Zhang, "Your 802.11 wireless network has no clothes," Wireless Communications, IEEE, vol.9, no.6, pp. 44-51, 2002.
-
(2002)
Wireless Communications, IEEE
, vol.9
, Issue.6
, pp. 44-51
-
-
Arbaugh, W.1
Shankar, N.2
Wan, Y.3
Zhang, K.4
-
8
-
-
70349147400
-
Practical attacks against wep and wpa
-
New York, NY, USA: ACM
-
E. Tews and M. Beck, "Practical attacks against wep and wpa," in WiSec '09: Proceedings of the second ACM conference on Wireless network security. New York, NY, USA: ACM, 2009, pp. 79-86.
-
(2009)
WiSec '09: Proceedings of the Second ACM Conference on Wireless Network Security
, pp. 79-86
-
-
Tews, E.1
Beck, M.2
-
9
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Urbana-Champaign, IL, USA: ACM, [Online]. Available
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. Urbana-Champaign, IL, USA: ACM, 2005, pp. 46-57. [Online]. Available: http://portal.acm.org/citation.cfm?id=1062689.1062697
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
10
-
-
51249090677
-
Intelligent jamming in 802.11b wireless networks
-
Washington D.C., USA: OPNET
-
M. Acharya, T. Sharma, D. Thuente, and D. Sizemore, "Intelligent jamming in 802.11b wireless networks," in Proceedings of OPNETWORK. Washington D.C., USA: OPNET, 2004.
-
(2004)
Proceedings of OPNETWORK
-
-
Acharya, M.1
Sharma, T.2
Thuente, D.3
Sizemore, D.4
-
12
-
-
4544326203
-
A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs
-
C. Wullems, K. Tham, J. Smith, and M. Looi, "A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs," in Wireless Telecommunications Symposium, 2004, pp. 129-136.
-
Wireless Telecommunications Symposium, 2004
, pp. 129-136
-
-
Wullems, C.1
Tham, K.2
Smith, J.3
Looi, M.4
-
13
-
-
36949015142
-
Understanding and mitigating the impact of RF interference on 802.11 networks
-
R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan, "Understanding and mitigating the impact of RF interference on 802.11 networks," SIGCOMM Comput. Commun. Rev., vol.37, no.4, pp. 385-396, 2007.
-
(2007)
SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.4
, pp. 385-396
-
-
Gummadi, R.1
Wetherall, D.2
Greenstein, B.3
Seshan, S.4
-
14
-
-
51349091564
-
On the performance of IEEE 802.11 under jamming
-
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, "On the performance of IEEE 802.11 under jamming," in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008, pp. 1265-1273.
-
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008
, pp. 1265-1273
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
15
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX, 2003, pp. 15-28.
-
Proc. USENIX, 2003
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
17
-
-
51249088743
-
Denial of service attacks against 802.11 DCF
-
B. Chen, V. Muthukkumarasamy, N. Guimaraes, P. Isaias, and A. Goikoetxea, "Denial of service attacks against 802.11 DCF," in Proceedings of the IADIS International Conference: Applied Computing, 2006.
-
Proceedings of the IADIS International Conference: Applied Computing, 2006
-
-
Chen, B.1
Muthukkumarasamy, V.2
Guimaraes, N.3
Isaias, P.4
Goikoetxea, A.5
-
19
-
-
51949113065
-
Intelligent jamming in wireless networks with applications to 802.11b and other networks
-
D. J. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applications to 802.11b and other networks," in Proc. MILCOM, October 2006.
-
Proc. MILCOM, October 2006
-
-
Thuente, D.J.1
Acharya, M.2
-
20
-
-
47949091481
-
Jamming vulnerabilities of IEEE 802.11e
-
D. J. Thuente, B. Newlin, and M. Acharya, "Jamming vulnerabilities of IEEE 802.11e," in Proc. MILCOM, 2007, pp. 1-7.
-
Proc. MILCOM, 2007
, pp. 1-7
-
-
Thuente, D.J.1
Newlin, B.2
Acharya, M.3
-
21
-
-
49049121983
-
Intelligent jamming attacks, counterattacks and (Counter)̂2 attacks in 802.11b wireless networks
-
M. Acharya and D. Thuente, "Intelligent jamming attacks, counterattacks and (Counter)̂2 attacks in 802.11b wireless networks," in Proceedings of OPNETWORK. Washington D.C., USA: OPNET, 2005.
-
Proceedings of OPNETWORK. Washington D.C., USA: OPNET, 2005
-
-
Acharya, M.1
Thuente, D.2
-
22
-
-
34247489321
-
Vulnerability assessment of ad hoc networks to MAC layer misbehavior
-
DOI 10.1002/wcm.391
-
L. Guang and C. Assi, "Vulnerability assessment of ad hoc networks to MAC layer misbehavior," Wireless Communications and Mobile Computing, vol.7, no.6, pp. 703-715, 2007. (Pubitemid 47265059)
-
(2007)
Wireless Communications and Mobile Computing
, vol.7
, Issue.6
, pp. 703-715
-
-
Guang, L.1
Assi, C.2
-
25
-
-
77951292864
-
High speed risks in 802.11n networks
-
ARUBA Networks, [Online]. Available
-
J. Wright, "High speed risks in 802.11n networks," in RSA Conference. ARUBA Networks, 2008. [Online]. Available: http://www. willhackforsushi.com/presentations/rsa2008-wright.pdf
-
(2008)
RSA Conference
-
-
Wright, J.1
-
28
-
-
4544221258
-
Access points vulnerabilities to DoS attacks in 802.11 networks
-
Vol.1
-
F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access points vulnerabilities to DoS attacks in 802.11 networks," in IEEE Wireless Communications and Networking Conference (WCNC), vol.1, 2004, pp. 634-638 Vol.1.
-
(2004)
IEEE Wireless Communications and Networking Conference (WCNC)
, vol.1
, pp. 634-638
-
-
Ferreri, F.1
Bernaschi, M.2
Valcamonici, L.3
-
29
-
-
38849204787
-
Discovering and exploiting 802.11 wireless driver vulnerabilities
-
L. Butti and J. Tinnés, "Discovering and exploiting 802.11 wireless driver vulnerabilities," Journal in Computer Virology, vol.4, no.1, pp. 25-37, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.1
, pp. 25-37
-
-
Butti, L.1
Tinnés, J.2
-
30
-
-
42149166675
-
Overhaul of ieee 802.11 modeling and simulation ns-2
-
C.-F. Chiasserini, N. B. Abu-Ghazaleh, and S. E. Nikoletseas, Eds. Chania, Crete Island, Greece: ACM, Oct. [Online]. Available
-
Q. Chen, F. Schmidt-Eisenlohr, D. Jiang, M. Torrent-Moreno, L. Delgrossi, and H. Hartenstein, "Overhaul of ieee 802.11 modeling and simulation ns-2," in Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2007, C.-F. Chiasserini, N. B. Abu-Ghazaleh, and S. E. Nikoletseas, Eds. Chania, Crete Island, Greece: ACM, Oct. 2007, pp. 159-168. [Online]. Available: http://doi.acm.org/10.1145/1298126.1298155
-
(2007)
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2007
, pp. 159-168
-
-
Chen, Q.1
Schmidt-Eisenlohr, F.2
Jiang, D.3
Torrent-Moreno, M.4
Delgrossi, L.5
Hartenstein, H.6
|