-
2
-
-
37749006403
-
802.11 User fingerprinting
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, D. Wetherall, 802.11 User fingerprinting, in: Proceedings of Mobicom 2007, pp. 99110.
-
(2007)
Proceedings of Mobicom
, pp. 99-110
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
3
-
-
77955715123
-
-
WiGLE.net, http://www.wigle.net/gps/gps/main.
-
-
-
-
4
-
-
18144401989
-
Rogue access point detection using temporal traffic characteristics
-
29 Nov. 3, Dec.
-
R. Beyah, S. Kangude, G. Yu, B. Strickland, J. Copeland, Rogue access point detection using temporal traffic characteristics, in: Proceedings of the IEEE Global Telecommunications Conference, Globecom 2004, vol. 4, 29 Nov. 3, Dec. 2004, pp. 22712275.
-
(2004)
Proceedings of the IEEE Global Telecommunications Conference, Globecom 2004
, vol.4
, pp. 2271-2275
-
-
Beyah, R.1
Kangude, S.2
Yu, G.3
Strickland, B.4
Copeland, J.5
-
5
-
-
11244291937
-
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
-
A. Adya, P. Bahl, R. Chandra, L. Qiu, Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks, in: Proceedings of the International Conference on Mobile Computing and Networking, MobiCom 2004, pp. 3044.
-
(2004)
Proceedings of the International Conference on Mobile Computing and Networking, MobiCom
, pp. 30-44
-
-
Adya, A.1
Bahl, P.2
Chandra, R.3
Qiu, L.4
-
8
-
-
84885705278
-
Measurement-based characterization of 802.11 in a hotspot setting
-
M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, J. Zahorjan, Measurement-based characterization of 802.11 in a hotspot setting, in: Proceedings of the ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, pp. 510.
-
Proceedings of the ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis
, pp. 5-10
-
-
Rodrig, M.1
Reis, C.2
Mahajan, R.3
Wetherall, D.4
Zahorjan, J.5
-
9
-
-
11244319474
-
A framework for wireless LAN monitoring and its applications
-
WiSe
-
J. Yao, M. Youssef, A. Agrawala, A framework for wireless LAN monitoring and its applications, in: Proceedings of the ACM Workshop on Wireless Security, WiSe 2004, pp. 7079.
-
(2004)
Proceedings of the ACM Workshop on Wireless Security
, pp. 70-79
-
-
Yao, J.1
Youssef, M.2
Agrawala, A.3
-
10
-
-
51349162676
-
A hybrid rogue access point protection framework for commodity Wi-Fi networks
-
L. Ma, A.Y. Teymorian, X. Cheng, A hybrid rogue access point protection framework for commodity Wi-Fi networks, in: IEEE INFOCOM 2008, pp. 12201228.
-
(2008)
IEEE INFOCOM
, pp. 1220-1228
-
-
Ma, L.1
Teymorian, A.Y.2
Cheng, X.3
-
12
-
-
33750825847
-
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
-
M. Raya, I. Aad, J.P. Hubaux, A.E. Fawal, DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots, IEEE Transactions on Mobile Computing, 5 (12), 16911705.
-
IEEE Transactions on Mobile Computing
, vol.5
, Issue.12
, pp. 1691-1705
-
-
Raya, M.1
Aad, I.2
Hubaux, J.P.3
Fawal, A.E.4
-
13
-
-
4544324338
-
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
-
M. Raya, J.P. Hubaux, I. Aad, DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots, in: Proceedings of the ACM MobiSys 2004, pp. 8497.
-
(2004)
Proceedings of the ACM MobiSys
, pp. 84-97
-
-
Raya, M.1
Hubaux, J.P.2
Aad, I.3
-
14
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
A. Kiayias, and M. Yung Secure scalable group signature with dynamic joins and separable authorities International Journal of Security and Networks 1 12 2006 24 45
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.12
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
15
-
-
43949099400
-
-
Pisa, Italy
-
Y.C. Cheng, J. Bellardo, P. Benk, A.C. Snoeren, G.M. Voelker, S. Savage, Jigsaw: Solving the puzzle of enterprise 802.11 analysis, SIGCOMM'06, Pisa, Italy, 2006.
-
(2006)
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis, SIGCOMM'06
-
-
Cheng, Y.C.1
-
17
-
-
72449209394
-
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
-
H. Englund, and T. Johansson Three ways to mount distinguishing attacks on irregularly clocked stream ciphers International Journal of Security and Networks 1 12 2006 95 102
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.12
, pp. 95-102
-
-
Englund, H.1
Johansson, T.2
-
18
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
J. Deng, R. Han, and S. Mishra Limiting DoS attacks during multihop data delivery in wireless sensor networks International Journal of Security and Networks 1 34 2006 167 178
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
19
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
X. Wang The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones International Journal of Security and Networks 1 34 2006 184 197
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.34
, pp. 184-197
-
-
Wang, X.1
-
23
-
-
74049111426
-
Hash-AV: Fast virus signature scanning by cache-resident filters
-
O. Erdogan, and P. Cao Hash-AV: Fast virus signature scanning by cache-resident filters International Journal of Security and Networks 2 12 2007 50 59
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.12
, pp. 50-59
-
-
Erdogan, O.1
Cao, P.2
-
26
-
-
77955714466
-
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
-
I. Ray, and N. Poolsappasit Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents International Journal of Security and Networks 3 2 2008 80 94
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 80-94
-
-
Ray, I.1
Poolsappasit, N.2
-
27
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa, and S. Shenoi Forensic analysis of SCADA systems and networks International Journal of Security and Networks 3 2 2008 95 102
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
31
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Y. Xiao Flow-net methodology for accountability in wireless networks IEEE Network 23 5 2009 30 37
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
|