-
1
-
-
0004098468
-
-
Cisco Wireless LAN Solution Engine (WLSE). White paper, http://www.cisco.com/en/US/products/sw/cscoworkips3915/.
-
White Paper
-
-
-
3
-
-
77956579801
-
Rogue access point detection: Automatically detect and manage wireless threats to your network
-
Rogue access point detection: Automatically detect and manage wireless threats to your network. White paper, http://www.proxim.com.
-
White Paper
-
-
-
4
-
-
77956591308
-
Soft AP solutions
-
Soft AP solutions. White paper, http://www.marvell.com/products/wireless/ softapjsp.
-
White Paper
-
-
-
9
-
-
77956595324
-
-
Wavelink. http://www.wavelink.com.
-
Wavelink
-
-
-
12
-
-
77956586796
-
Tired of rogues? Solutions for detecting and eliminating rogue wireless networks
-
AirDefense
-
AirDefense. TIRED OF ROGUES? Solutions for Detecting and Eliminating Rogue Wireless Networks. White paper, http://wirelessnetworkchannel-asia. motorola.com/pdf/.
-
White Paper
-
-
-
13
-
-
33748979867
-
Enhancing the security of corporate Wi-Fi networks using DAIR
-
P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill. Enhancing the security of corporate Wi-Fi networks using DAIR. In Proc. MobiSys'06, 2006.
-
(2006)
Proc. MobiSys'06
-
-
Bahl, P.1
Chandra, R.2
Padhye, J.3
Ravindranath, L.4
Singh, M.5
Wolman, A.6
Zill, B.7
-
15
-
-
18144401989
-
Rogue access point detection using temporal traffic characteristics
-
R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland. Rogue access point detection using temporal traffic characteristics. In IEEE Global Telecommunications Conference (GLOBECOM'04), 2004.
-
(2004)
IEEE Global Telecommunications Conference (GLOBECOM'04)
-
-
Beyah, R.1
Kangude, S.2
Yu, G.3
Strickland, B.4
Copeland, J.5
-
16
-
-
0032292315
-
IEEE 802.11-saturation throughput analysis
-
G. Bianchi and D. e Inf. IEEE 802.11-saturation throughput analysis. IEEE communications letters, 2(12):318-320, 1998.
-
(1998)
IEEE Communications Letters
, vol.2
, Issue.12
, pp. 318-320
-
-
Bianchi, G.1
Inf, D.E.2
-
18
-
-
14044261214
-
Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters
-
C. Foh and J. Tantra. Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters. IEEE Communications Letters, 9(2):130-132, 2005.
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.2
, pp. 130-132
-
-
Foh, C.1
Tantra, J.2
-
20
-
-
51349162676
-
A hybrid rogue access point protection framework for commodity Wi-Fi networks
-
L. Ma, A. Teymorian, and X. Cheng. A hybrid rogue access point protection framework for commodity Wi-Fi networks. In Proc. IEEE Infocom'08, 2008.
-
(2008)
Proc. IEEE Infocom'08
-
-
Ma, L.1
Teymorian, A.2
Cheng, X.3
-
21
-
-
1642391955
-
Microsoft windows 2000 TCP/IP Implementation details
-
D. MacDonald and W. Barkley. Microsoft Windows 2000 TCP/IP Implementation Details. White paper, http://technet.microsoft.com/en-us/library/bb726981.aspx.
-
White Paper
-
-
MacDonald, D.1
Barkley, W.2
-
22
-
-
40049098504
-
RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning
-
C. Mano, A. Blaich, Q. Liao, Y. Jiang, D. Cieslak, D. Salyers, and A. Striegel. RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning. ACM Transactions on Information and System Security (TISSEC), 11(2):1-23, 2008.
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.11
, Issue.2
, pp. 1-23
-
-
Mano, C.1
Blaich, A.2
Liao, Q.3
Jiang, Y.4
Cieslak, D.5
Salyers, D.6
Striegel, A.7
-
27
-
-
0031274649
-
Wide-area Internet traffic patterns and characteristics
-
K. Thompson, G. Miller, and R. Wilder. Wide-area Internet traffic patterns and characteristics. IEEE network, 11(6):10-23, 1997.
-
(1997)
IEEE Network
, vol.11
, Issue.6
, pp. 10-23
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
32
-
-
39049088703
-
Identifying 802.11 traffic from passive measurements using iterative Bayesian inference
-
W. Wei, S. Jaiswal, J. Kurose, and D. Towsley. Identifying 802.11 traffic from passive measurements using iterative Bayesian inference. In Proc. IEEE INFOCOM'06, 2006.
-
(2006)
Proc. IEEE INFOCOM'06
-
-
Wei, W.1
Jaiswal, S.2
Kurose, J.3
Towsley, D.4
-
33
-
-
42149159995
-
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
-
W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (IMC'07), 2007.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC'07)
-
-
Wei, W.1
Suh, K.2
Wang, B.3
Gu, Y.4
Kurose, J.5
Towsley, D.6
-
34
-
-
54049086489
-
Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup?
-
W. Wei, B. Wang, C. Zhang, J. Kurose, and D. Towsley. Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup? Computer Networks, 52(17):3205-3217, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.17
, pp. 3205-3217
-
-
Wei, W.1
Wang, B.2
Zhang, C.3
Kurose, J.4
Towsley, D.5
-
35
-
-
51249109756
-
Detecting protected layer-3 rogue APs
-
H. Yin, G. Chen, and J. Wang. Detecting protected layer-3 rogue APs. In Proceedings of the Fourth IEEE International Conference on Broadband Communications, Networks, and Systems (BROADNETS'07), 2007.
-
(2007)
Proceedings of the Fourth IEEE International Conference on Broadband Communications, Networks, and Systems (BROADNETS'07)
-
-
Yin, H.1
Chen, G.2
Wang, J.3
|