-
1
-
-
84921889780
-
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
-
Elsevier, Amsterdam (September)
-
Bicacki, K., Tavli, B.: Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. In: Computer Standards and Interfaces. Elsevier, Amsterdam (September 2008)
-
(2008)
Computer Standards and Interfaces
-
-
Bicacki, K.1
Tavli, B.2
-
2
-
-
47949091481
-
Jamming Vulnerabilities of IEEE 802.11e
-
IEEE, Los Alamitos (October)
-
Thuente, D., Newlin, B., Acharya, M.: Jamming Vulnerabilities of IEEE 802.11e. In: Proc. of MilCom 2007, pp. 1-7. IEEE, Los Alamitos (October 2007)
-
(2007)
Proc. of MilCom 2007
, pp. 1-7
-
-
Thuente, D.1
Newlin, B.2
Acharya, M.3
-
3
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
41-47 (May)
-
Wenyuan, X., Ke, M., Trappe, W., Yanyong, Z.: Jamming sensor networks: attack and defense strategies. IEEE Network, 41-47 (May 2006)
-
(2006)
IEEE Network
-
-
Wenyuan, X.1
Ke, M.2
Trappe, W.3
Yanyong, Z.4
-
4
-
-
33847392537
-
Effect of pulse jamming on IEEE 802.11 wireless LAN performance
-
IEEE, Los Alamitos (October)
-
Hall, M., Silvennoinen, A., Haggman, S.: Effect of pulse jamming on IEEE 802.11 wireless LAN performance. In: Proc. of MilCom 2005, pp. 2301-2306. IEEE, Los Alamitos (October 2005)
-
(2005)
Proc. of MilCom 2005
, pp. 2301-2306
-
-
Hall, M.1
Silvennoinen, A.2
Haggman, S.3
-
7
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
(May)
-
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proc. of ACM MobiHoc (May 2005)
-
(2005)
Proc. of ACM MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
8
-
-
35148872165
-
A Cross-layer approach to detect jamming attacks in wireless ad hoc networks
-
Washington DC, USA, October 2006
-
Thamilarasu, M., Mishra, S., Sridhar, R.: A Cross-layer approach to detect jamming attacks in wireless ad hoc networks. In: Proc. of Milcom 2006, Washington DC, USA, October 2006, pp. 1-7 (2006)
-
(2006)
Proc. of Milcom 2006
, pp. 1-7
-
-
Thamilarasu, M.1
Mishra, S.2
Sridhar, R.3
-
10
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, 33-51 (2006)
-
(2006)
Journal of High Speed Networks
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
11
-
-
33748965525
-
MOJO: A distributed physical layer anomaly detection system for 802.11 WLANs
-
Sheth, A., Doerr, C., Grunwald, D., Han, R., Sicker, D.: MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. In: ACM MobiSys (2006)
-
(2006)
ACM MobiSys
-
-
Sheth, A.1
Doerr, C.2
Grunwald, D.3
Han, R.4
Sicker, D.5
-
12
-
-
14644397228
-
Change-point monitoring for the detection of DoS attacks
-
IEEE, Los Alamitos
-
Wang, H., Zhang, D., Shin, K.: Change-point monitoring for the detection of DoS attacks. In: Transactions on Dependable and Secure Computing. IEEE, Los Alamitos (2004)
-
(2004)
Transactions on Dependable and Secure Computing
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
14
-
-
84925338777
-
Distributed change-point detection of DDoS Attacks: Experimental results on DETER testbed
-
(August)
-
Chen, Y., Hwang, K., Ku, W.: Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed. In: Proc. of USENIX Security Symposium, Boston, USA (August 2007)
-
(2007)
Proc. of USENIX Security Symposium Boston USA
-
-
Chen, Y.1
Hwang, K.2
Ku, W.3
-
15
-
-
77953753918
-
-
Ntp: the network time protocol, http://www.ntp.org
-
-
-
-
16
-
-
0002916530
-
Continuous inspection schemes
-
Page, E.S.: Continuous inspection schemes. Biometrika, 100-115 (1954)
-
(1954)
Biometrika
, pp. 100-115
-
-
Page, E.S.1
|