-
1
-
-
50149105732
-
Impact of denial of service attacks on ad hoc networks
-
Aug
-
I. Aad, J. Hubaux, and E. Knightly, "Impact of Denial of Service Attacks on Ad Hoc Networks", IEEE/ACM Trans. Networking, vol. 16, no. 4, pp. 791-802, Aug. 2008.
-
(2008)
IEEE/ACM Trans. Networking
, vol.16
, Issue.4
, pp. 791-802
-
-
Aad, I.1
Hubaux, J.2
Knightly, E.3
-
2
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Aug
-
J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions", Proc. 12th USENIX Security Symp., Aug. 2003.
-
(2003)
Proc. 12th USENIX Security Symp.
-
-
Bellardo, J.1
Savage, S.2
-
3
-
-
25644442524
-
On selfish behavior in CSMA/CA networks
-
Mar
-
M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On Selfish Behavior in CSMA/CA Networks", Proc. IEEE Infocom, Mar. 2005.
-
(2005)
Proc. IEEE Infocom
-
-
Cagalj, M.1
Ganeriwal, S.2
Aad, I.3
Hubaux, J.-P.4
-
4
-
-
78149448948
-
-
Click
-
Click, http://pdos.csail.mit.edu/click/, 2010.
-
(2010)
-
-
-
7
-
-
3042647758
-
A survey of secure wireless ad Hoc routing
-
special issue on making wireless work, May
-
Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy, special issue on making wireless work, vol. 2, no. 3, pp. 28-39, May 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.1
Perrig, A.2
-
8
-
-
78149455980
-
-
In-stat, http://www.in-stat.com/catalog/Wcatalogue.asp?id=167, 2010.
-
(2010)
-
-
-
10
-
-
0036957872
-
Analysis of a campus-wide wireless network
-
Sept
-
D. Kotz and K. Essien, "Analysis of a Campus-Wide Wireless Network", Proc. ACM MOBICOM, Sept. 2002.
-
(2002)
Proc. ACM MOBICOM
-
-
Kotz, D.1
Essien, K.2
-
11
-
-
8344224137
-
Low-rate TCP-targeted denial of service attacks (the shrew versus the mice and elephants)
-
Aug
-
A. Kuzmanovic and E. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks (the Shrew versus the Mice and Elephants)", Proc. ACM SIGCOMM, Aug. 2003.
-
(2003)
Proc. ACM SIGCOMM
-
-
Kuzmanovic, A.1
Knightly, E.2
-
12
-
-
36048989292
-
Detection and handling of MAC layer misbehavior in wireless networks
-
Apr
-
P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks", IEEE Trans. Mobile Computing, Apr. 2004.
-
(2004)
IEEE Trans. Mobile Computing
-
-
Kyasanur, P.1
Vaidya, N.2
-
14
-
-
33750825847
-
DOMINO: Detecting mac layer greedy behavior in IEEE 802.11 hotspots
-
Dec
-
M. Raya, I. Aad, J. P. Hubaux, and A. E. Fawal, "DOMINO: Detecting Mac Layer Greedy Behavior in IEEE 802.11 Hotspots", IEEE Trans. Mobile Computing, vol. 5, no. 12, pp. 1691-1705, Dec. 2006.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, Issue.12
, pp. 1691-1705
-
-
Raya, M.1
Aad, I.2
Hubaux, J.P.3
Fawal, A.E.4
-
15
-
-
4544324338
-
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
-
Sept
-
M. Raya, J. P. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots", Proc. MobiSys, Sept. 2004.
-
(2004)
Proc. MobiSys
-
-
Raya, M.1
Hubaux, J.P.2
Aad, I.3
-
16
-
-
36849068013
-
Measurement-based models of delivery and interference
-
C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Measurement-Based Models of Delivery and Interference", Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Reis, C.1
Mahajan, R.2
Rodrig, M.3
Wetherall, D.4
Zahorjan, J.5
-
17
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
Oct
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, "TCP Congestion Control with a Misbehaving Receiver", Proc. ACM Computer Comm. Rev., Oct. 1999.
-
(1999)
Proc. ACM Computer Comm. Rev.
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
18
-
-
33749540300
-
Internet packet size distributions: Some observations
-
USC/Information Sciences Inst., May
-
R. Sinha, C. Papadopoulos, and J. Heidemann, "Internet Packet Size Distributions: Some Observations", Technical Report ISI-TR-2007-643, USC/Information Sciences Inst., May 2007.
-
(2007)
Technical Report ISI-TR-2007-643
-
-
Sinha, R.1
Papadopoulos, C.2
Heidemann, J.3
-
19
-
-
0034539052
-
Analysis of a local-area wireless network
-
Sept
-
D. Tang, "Analysis of a Local-Area Wireless Network", Proc. MOBICOM, Sept. 2000.
-
(2000)
Proc. MOBICOM
-
-
Tang, D.1
-
20
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
May
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks", Proc. ACM MobiHoc, May 2005.
-
(2005)
Proc. ACM MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
|