-
1
-
-
80051543490
-
-
National Center for Missing Exploited and Children. Child Pornography Fact Sheet
-
National Center for Missing Exploited and Children. Child Pornography Fact Sheet: Http://www.missingkids.com/missingkids/servlet/PageServlet? LanguageCountry=enUS&PageId=2451.
-
-
-
-
2
-
-
80051506791
-
-
Business Software Alliance Year in Review
-
Business Software Alliance 2009 Year in Review: Http://www.bsa.org/ ~/media/Files/General/YIR2009.ashx.
-
(2009)
-
-
-
3
-
-
80051481725
-
-
Federal Trade Commission Identity Theft Survey Report
-
Federal Trade Commission 2006 Identity Theft Survey Report: Http: //www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf.
-
(2006)
-
-
-
4
-
-
80051490331
-
-
Francois Paget, McAfee Avert Labs " Financial Fraud and Internet Banking: Threats and Countermeasures"
-
Francois Paget, McAfee Avert Labs, "Financial Fraud and Internet Banking: Threats and Countermeasures": Http://www.mcafee.com/us/ local content/reports/6168rpt fraud 0409.pdf.
-
-
-
-
7
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
DOI 10.1109/ICC.2007.767, 4289438, 2007 IEEE International Conference on Communications, ICC'07
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in ether: Using the physical layer for wireless authentication," in Proc. IEEE Int. Conf. Communications (ICC), June 2007, pp. 4646-4651. (Pubitemid 351146262)
-
(2007)
IEEE International Conference on Communications
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
8
-
-
69749083720
-
Channel-based detection of sybil attacks in wireless networks
-
September
-
"Channel-based detection of sybil attacks in wireless networks," in IEEE Transactions on Information Forensics and Security, September 2009, pp. VOL. 4, NO. 3.
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
-
-
-
9
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
DOI 10.1145/1161289.1161297, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing wireless systems via lower layer enforcements," in Proc. 5th ACM workshop on Wireless security, 2006, pp. 33-42. (Pubitemid 46634300)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 33-42
-
-
Zang, L.1
Wenyuan, X.2
Miller, R.3
Trappe, W.4
-
10
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
N. Patwari and S. Kasera, "Robust location distinction using temporal link signatures," in ACM MOBICOM, 2007, pp. 111-122.
-
(2007)
ACM MOBICOM
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.2
-
11
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
D. Faria and D. Cheriton, "Radio-layer security: Detecting identitybased attacks in wireless networks using signalprints," in IProc. 5th ACM Workshop on Wireless Security (WiSe'06), Sep 2006, pp. 43-52. (Pubitemid 46634301)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
12
-
-
54849406264
-
Detecting 802.11 mac layer spoofing using received signal strength
-
April
-
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, "Detecting 802.11 mac layer spoofing using received signal strength," in 27th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), April 2008, pp. 1768-1776.
-
(2008)
27th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM
, pp. 1768-1776
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
13
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting (extended abstract)
-
November
-
J. Hall, M. Barbeau, and E. Kranakis, "Enhancing intrusion detection in wireless networks using radio frequency fingerprinting (extended abstract)," in 3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT), November 2004.
-
(2004)
3rd IASTED International Conference on Communications, Internet and Information Technology (CIIT
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
14
-
-
60149084101
-
-
PhD Dissertation, School of Computer Science, Carleton University, Ottawa, Ontario
-
J. Hall, "Detection of rogue devices in wireless networks." PhD Dissertation, School of Computer Science, Carleton University, Ottawa, Ontario, 2006.
-
(2006)
Detection of Rogue Devices in Wireless Networks
-
-
Hall, J.1
-
15
-
-
0343349593
-
Bayesian detection of radio transmitter turn-on transients
-
O. Ureten and N. Serinken, "Bayesian detection of radio transmitter turn-on transients," in NSIP99, 1999, pp. 830-834.
-
(1999)
NSIP99
, pp. 830-834
-
-
Ureten, O.1
Serinken, N.2
-
16
-
-
24344507334
-
Remote physical device fingerprinting
-
DOI 10.1109/TDSC.2005.26
-
T. Kohno, A. Broido, and k. Claffy, "Remote physical device fingerprinting," in IEEE Transactions on Dependable Secure Comput., 2005, pp. 93-108. (Pubitemid 41259859)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
17
-
-
65249168699
-
Physical-layer intrusion detection in wireless networks
-
A. Tomko, A. Rieser, and L. Buell, "Physical-layer intrusion detection in wireless networks," in Military Communications Conference, 2006, pp. 1-6.
-
(2006)
Military Communications Conference
, pp. 1-6
-
-
Tomko, A.1
Rieser, A.2
Buell, L.3
-
18
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
March
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proc. 14th ACM international conference on Mobile computing and networking, March 2008, pp. 116- 127.
-
(2008)
Proc. 14th ACM international conference on Mobile computing and networking
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
19
-
-
33947592642
-
Brownian-bridge-based statistical analysis of the dac inl caused by current mismatch
-
G. I. Radulov, M. Heydenreich, R. W. van der Hofstad, J. A. Hegt, and A. H. van Roermund, "Brownian-bridge-based statistical analysis of the dac inl caused by current mismatch," in IEEE Trans. Circuits Syst. II, Exp. Briefs, VOL. 54, NO. 2, 2007.
-
(2007)
IEEE Trans. Circuits Syst. II, Exp. Briefs
, vol.54
, Issue.2
-
-
Radulov, G.I.1
Heydenreich, M.2
Van Der Hofstad, R.W.3
Hegt, J.A.4
Van Roermund, A.H.5
-
20
-
-
0039976465
-
-
October 27)
-
T. Anderson, M. Stevens, N. Mandayam, and W. Trappe, "Linear algebra and its applications." Volume 264, Number 1, October 1997 , pp. 145- 171(27).
-
(1997)
Linear Algebra and its Applications
, vol.264
, Issue.1
, pp. 145-171
-
-
Anderson, T.1
Stevens, M.2
Mandayam, N.3
Trappe, W.4
-
22
-
-
80051486179
-
-
Data Sheetc Analog Devices AD9776A/AD9778A/AD9779A
-
Data Sheet, Analog Devices AD9776A/AD9778A/AD9779A: Http://www.analog. com/static/imported-files/data sheets/AD9776 9778 9779.pdf.
-
-
-
-
23
-
-
28044466164
-
Optimum DAC resolution for WMAN, WLAN and WPAN OFDM-based standards
-
9.2-4, 2005 Digest of Technical Papers - International Conference on Consumer Electronics, ICCE 2005
-
A. Mehrnia, "Optimum dac resolution for wman, wlan and wpan ofdm based standards," in International Conference on Consumer Electronics, 2005, pp. 355-356. (Pubitemid 41688151)
-
(2005)
Digest of Technical Papers - IEEE International Conference on Consumer Electronics
, pp. 355-356
-
-
Mehrnia, A.1
-
24
-
-
80051479251
-
-
Data Sheet MAXIM MAX5858 dual 10-bit 300Msps digital to analog converter
-
Data Sheet, MAXIM MAX5858 dual, 10-bit, 300Msps digital to analog converter: Http://datasheets.maxim-ic.com/en/ds/MAX5858.pdf.
-
-
-
-
25
-
-
80051506469
-
-
Data Sheet SKYWORKS SKY65006-348LF
-
Data Sheet, SKYWORKS SKY65006-348LF: Http://www.skyworksinc. com/uploads/documents/200122H.pdf.
-
-
-
-
26
-
-
80051501628
-
-
Data Sheet MAXIM MAX2242, 2.4GHz to 2.5GHz Linear Power Amplifier
-
Data Sheet, MAXIM MAX2242, 2.4GHz to 2.5GHz Linear Power Amplifier: . http://datasheets.maxim-ic.com/en/ds/MAX2242.pdf
-
-
-
|