-
1
-
-
80053516172
-
-
ANSI/IEEE Std 802.11, Edition, Part: 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications June 1999
-
ANSI/IEEE Std 802.11, 1999 Edition, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, June 1999.
-
(1999)
-
-
Shariff, M.1
-
2
-
-
80053534286
-
-
International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE)
-
R. Ataide, Z. Abdelouahab, "An architecture for wireless intrusion detection systems using artificial neural networks," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE), 2008.
-
(2008)
An architecture for wireless intrusion detection systems using artificial neural networks
-
-
Ataide, R.1
Abdelouahab, Z.2
-
3
-
-
84934300624
-
-
Proceedings of IEEE International Conference on Portable Information Devices
-
T. K. Buennemeyer, M. Gora, R. C. Marchany, and J. G. Tront, "Battery exhaustion attack detection with small handheld mobile computers," In Proceedings of IEEE International Conference on Portable Information Devices, pp. 1-5, 2007.
-
(2007)
Battery exhaustion attack detection with small handheld mobile computers
, pp. 1-5
-
-
Buennemeyer, T.K.1
Gora, M.2
Marchany, R.C.3
Tront, J.G.4
-
4
-
-
48749093353
-
Using battery constrains with mobile hosts to improve network security
-
G. A. Jacoby, N. J. Davis, and R. Marchany, "Using battery constrains with mobile hosts to improve network security", IEEE Security e Privacy, Vol. 4, No. 5, pp. 40-49, 2006.
-
(2006)
IEEE Security e Privacy
, vol.4
, Issue.5
, pp. 40-49
-
-
Jacoby, G.A.1
Davis, N.J.2
Marchany, R.3
-
5
-
-
77954758479
-
Cloned access point detection and prevention mechanism in IEEE 802.11 wireless mesh networks
-
S. Khan, N. Mast, K.-K. Loo, A. Salahuddin, "Cloned access point detection and prevention mechanism in IEEE 802.11 wireless mesh networks," Journal of Information Assurance and Security, Vol. 3, No. 4, pp.257-262, 2008.
-
(2008)
Journal of Information Assurance and Security
, vol.3
, Issue.4
, pp. 257-262
-
-
Khan, S.1
Mast, N.2
Loo, K.-K.3
Salahuddin, A.4
-
6
-
-
79952397095
-
Passive security threats and consequences in IEEE 802.11 wireless mesh networks
-
S. Khan, N. Mast, K.-K. Loo, A. Salahuddin, "Passive security threats and consequences in IEEE 802.11 wireless mesh networks," Journal of Digital Content Technology and its Application, Vol. 2, No. 3, pp. 4-8, 2008.
-
(2008)
Journal of Digital Content Technology and its Application
, vol.2
, Issue.3
, pp. 4-8
-
-
Khan, S.1
Mast, N.2
Loo, K.-K.3
Salahuddin, A.4
-
8
-
-
51849165002
-
-
Proceedings of 8th IEEE International Conference on Computer and Information Technology
-
M. F. Marhusin, L. Cornforth, D. Henry, "An overview of recent advances in intrusion detection," In Proceedings of 8th IEEE International Conference on Computer and Information Technology, pp. 432-437, 2008.
-
(2008)
An overview of recent advances in intrusion detection
, pp. 432-437
-
-
Marhusin, M.F.1
Cornforth, L.2
Henry, D.3
-
9
-
-
2642584004
-
-
Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications
-
T. Martin, M. Hsaio, H. Dong, J. Krinshnaswami, "Denial of service attacks on battery-powered mobile computers," In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications, pp. 309-318, 2004.
-
(2004)
Denial of service attacks on battery-powered mobile computers
, pp. 309-318
-
-
Martin, T.1
Hsaio, M.2
Dong, H.3
Krinshnaswami, J.4
-
10
-
-
33847285125
-
Software Tools for networking
-
O. Bonaventure, "Software Tools for networking", IEEE Network, Vol. 18, No. 6, pp 4-5, 2004.
-
(2004)
IEEE Network
, vol.18
, Issue.6
, pp. 4-5
-
-
Bonaventure, O.1
-
12
-
-
33644854066
-
-
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
-
D. C. Nash, T. L. Martin, D. S. Ha, M. S. Hsiao, "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 141-145, 2005.
-
(2005)
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
13
-
-
33845516367
-
Intrusion detection techniques
-
H. Bidgoli, ed., Wiley & Sons
-
P. Ning, S. Jajodia, "Intrusion detection techniques," The Internet Encyclopedia, H. Bidgoli, ed., Wiley & Sons, pp. 2-6, 2003.
-
(2003)
The Internet Encyclopedia
, pp. 2-6
-
-
Ning, P.1
Jajodia, S.2
-
14
-
-
25444504979
-
Wireless network security: 802.11, bluetooth and handheld devices
-
T. Karygiannis and L. Owens, "Wireless network security: 802.11, bluetooth and handheld devices," Special Publication 800-48, 2002.
-
(2002)
Special Publication
, pp. 800-848
-
-
Karygiannis, T.1
Owens, L.2
-
15
-
-
80053504957
-
-
Palm, Palm API Guide, Palm OS Platform - version 5.6, Available at: Accessed in 02/10//2009
-
Palm, "Palm API Guide, Palm OS Platform - version 5.6," Available at: https://pdnet.palm.com/regac/pdn/PalmOSAPIGuide/index.html, Accessed in 02/10//2009.
-
(2020)
-
-
-
16
-
-
0003478316
-
-
Technical Report CS90-20, Department of Computer Science, University of New Mexico, August, EUA
-
M. Servilla, R. Heady, G. Luger, and A. Maccabe, "The architecture of a network level intrusion detection system", Technical Report CS90-20, Department of Computer Science, University of New Mexico, August, EUA, 1990.
-
(1990)
The architecture of a network level intrusion detection system
-
-
Servilla, M.1
Heady, R.2
Luger, G.3
Maccabe, A.4
-
17
-
-
38849133535
-
-
Proceedings of the IEEE International Conference on Software Engineering Advancess
-
M. Silva, D. Lopes and Z. Abdelouahab, "A Remote IDS based on Multi-agent Systems, Web Services and MDA," Proceedings of the IEEE International Conference on Software Engineering Advances, pp. 64-69, 2006.
-
(2006)
A Remote IDS based on Multi-agent Systems, Web Services and MDA
, pp. 64-69
-
-
Silva, M.1
Lopes, D.2
Abdelouahab, Z.3
-
19
-
-
34250315640
-
An overview of anomaly detection techniques: existing solutions and latest technological trends
-
A. Patcha, J. M. Park, "An overview of anomaly detection techniques: existing solutions and latest technological trends," Computer Networks, Vol. 51, No. 12, pp. 3448-3470, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
20
-
-
77957977106
-
Denial of service attacks and challenges in broadband wireless networks
-
S. Khan, K.-K. Loo, T. Naeem, M. A. Khan, "Denial of service attacks and challenges in broadband wireless networks", Journal of Computer Science and Network Security, Vol. 8, No. 7, pp. 1-6, 2008.
-
(2008)
Journal of Computer Science and Network Security
, vol.8
, Issue.7
, pp. 1-6
-
-
Khan, S.1
Loo, K.-K.2
Naeem, T.3
Khan, M.A.4
|