-
1
-
-
33750825847
-
IEEE Trans. Mob. Comput.
-
10.1109/TMC.2006.183, 1536-1233
-
Raya, M., Aad, I., Hubaux, J., and Fawal, A.: 'DOMINO: detecting MAC layer greedy behavior in IEEE 802.11 hotspots', IEEE Trans. Mob. Comput., 2006, 5, (12), p. 1691-170510.1109/TMC.2006.183 1536-1233
-
(2006)
DOMINO: detecting MAC layer greedy behavior in IEEE 802.11 hotspots
, vol.5
, Issue.12
, pp. 1691-1705
-
-
Raya, M.1
Aad, I.2
Hubaux, J.3
Fawal, A.4
-
2
-
-
11244252132
-
Proc. ACM Mobicom
-
PA, USA, September
-
Aad, I., Hubaux, J., and Knightly, E.: 'Denial of service resilience in ad hoc networks', Proc. ACM Mobicom, PA, USA, September 2004, p. 202-215
-
(2004)
Denial of service resilience in ad hoc networks
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.2
Knightly, E.3
-
3
-
-
0037003792
-
Proc. MILCOM
-
CA, USA
-
Gupta, V., Krishnamurthy, S., and Faloutsous, M.: 'Denial of service attacks at the MAC layer in wireless ad hoc networks', Proc. MILCOM, CA, USA 2002, p. 1118-1123
-
(2002)
Denial of service attacks at the MAC layer in wireless ad hoc networks
, pp. 1118-1123
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsous, M.3
-
4
-
-
84858886969
-
Proc. ACM SASN
-
TX, USA, October
-
Cárdenas, A., Radosavac, S., and Baras, J.: 'Detection and prevention of MAC layer misbehavior in ad hoc networks', Proc. ACM SASN, TX, USA, October 2004, p. 17-22
-
(2004)
Detection and prevention of MAC layer misbehavior in ad hoc networks
, pp. 17-22
-
-
Cárdenas, A.1
Radosavac, S.2
Baras, J.3
-
5
-
-
85008044268
-
IEEE Trans. Mob. Comput.
-
10.1109/TMC.2005.71, 1536-1233
-
Kyasanur, P., and Vaidya, N.: 'Selfish MAC layer misbehavior in wireless networks', IEEE Trans. Mob. Comput., 2005, 4, (5), p. 502-51610.1109/TMC.2005.71 1536-1233
-
(2005)
Selfish MAC layer misbehavior in wireless networks
, vol.4
, Issue.5
, pp. 502-516
-
-
Kyasanur, P.1
Vaidya, N.2
-
6
-
-
84925368904
-
Proc. USENIX Security Symp.
-
Washington, DC, USA, August
-
Bellardo, J., and Savage, S.: '802.11 denial-of-service attacks: Real vulnerabilities and practical solutions', Proc. USENIX Security Symp., Washington, DC, USA, August 2003, p. 15-28
-
(2003)
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
7
-
-
60149092949
-
Proc. Mobicom
-
San Francisco, CA, USA, September
-
Brik, V., Banerjee, S., and Gruteser, M.: 'Wireless device identification with radiometric signatures', Proc. Mobicom, San Francisco, CA, USA, September 2008, p. 116-127
-
(2008)
Wireless device identification with radiometric signatures
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
-
8
-
-
48049094399
-
Proc. IEEE SECON
-
San Diego, USA, October
-
Chen, Y., Trappe, W., and Martin, R.: 'Detecting and localizing wireless spoofing attacks', Proc. IEEE SECON, San Diego, USA, October 2007, p. 193-202
-
(2007)
Detecting and localizing wireless spoofing attacks
, pp. 193-202
-
-
Chen, Y.1
Trappe, W.2
Martin, R.3
-
9
-
-
34247324807
-
Proc. ACM Workshop on Wireless Security
-
Los Angeles, CA, USA, September
-
Faria, D., and Cheriton, D.: 'Detecting identity-based attacks in wireless networks using signalprints', Proc. ACM Workshop on Wireless Security, Los Angeles, CA, USA, September 2006, p. 43-52
-
(2006)
Detecting identity-based attacks in wireless networks using signalprints
, pp. 43-52
-
-
Faria, D.1
Cheriton, D.2
-
10
-
-
44849107419
-
IEEE. Trans. Veh. Technol.
-
10.1109/TVT.2007.909291, 0018-9545
-
Guang, L., and Assi, C.: 'Enhancing IEEE 802.11. Random backoff in selfish environments', IEEE. Trans. Veh. Technol., 2008, 57, (3), p. 1806-182210.1109/TVT.2007.909291 0018-9545
-
(2008)
Enhancing IEEE 802.11. Random backoff in selfish environments
, vol.57
, Issue.3
, pp. 1806-1822
-
-
Guang, L.1
Assi, C.2
-
11
-
-
80155162775
-
-
'Game theoretic analysis of security in mobile and ad hoc networks', April, 2002
-
'Game theoretic analysis of security in mobile and ad hoc networks', April, 2002
-
-
-
-
12
-
-
80155159592
-
-
'On cheating in CSMA/CA ad hoc networks', March, 2004
-
'On cheating in CSMA/CA ad hoc networks', March, 2004
-
-
-
-
13
-
-
34547412444
-
IEEE J. Sel. Areas Commun.
-
10.1109/JSAC.2007.070806, 0733-8716
-
Jin, Y., and Kesidis, G.: 'Distributed contention window control for selfish users in IEEE 802.11 wireless LANs', IEEE J. Sel. Areas Commun., 2007, 25, (6), p. 1113-112310.1109/JSAC.2007.070806 0733-8716
-
(2007)
Distributed contention window control for selfish users in IEEE 802.11 wireless LANs
, vol.25
, Issue.6
, pp. 1113-1123
-
-
Jin, Y.1
Kesidis, G.2
-
14
-
-
1542360013
-
Proc. Int. Conf. Dependable Systems and Networks
-
San Francisco, USA, June
-
Kyasanur, P., and Vaidya, N.: 'Detection and handling of MAC layer misbehavior in wireless networks', Proc. Int. Conf. Dependable Systems and Networks, San Francisco, USA, June 2003, p. 173-182
-
(2003)
Detection and handling of MAC layer misbehavior in wireless networks
, pp. 173-182
-
-
Kyasanur, P.1
Vaidya, N.2
-
15
-
-
2442597363
-
Proc. MobiHoc
-
Lausanne, Switzerland, June
-
Buchegger, S., and Boudec, J.: 'Performance analysis of the CONFIDANT protocol', Proc. MobiHoc, Lausanne, Switzerland, June 2002, p. 226-236
-
(2002)
Performance analysis of the CONFIDANT protocol
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.2
-
16
-
-
70349671118
-
Proc. IEEE INFOCOM
-
Rio De Janeiro, Brazil
-
Pelechrinis, K., Yan, G., and Eidenbenz, S.: 'Detecting selfish exploitation of carrier sensing in 802.11 networks', Proc. IEEE INFOCOM, Rio De Janeiro, Brazil 2009, p. 657-665
-
(2009)
Detecting selfish exploitation of carrier sensing in 802.11 networks
, pp. 657-665
-
-
Pelechrinis, K.1
Yan, G.2
Eidenbenz, S.3
-
17
-
-
33749037166
-
Proc. ACM Workshop Wireless Security
-
Cologne, Germany, September
-
Radosavac, S., Baras, J., and Koutsopoulos, I.: 'A framework for MAC protocol misbehavior detection in wireless networks', Proc. ACM Workshop Wireless Security, Cologne, Germany, September 2005, p. 33-42
-
(2005)
A framework for MAC protocol misbehavior detection in wireless networks
, pp. 33-42
-
-
Radosavac, S.1
Baras, J.2
Koutsopoulos, I.3
-
18
-
-
49449096549
-
ACM Trans. Inf. Syst. Sec.
-
19:1-19:2410.1145/1380564.1380567
-
Radosavac, S., Moustakides, G., and Baras, J.: 'An analytic framework for modeling and detecting access layer misbehaviorin wireless networks', ACM Trans. Inf. Syst. Sec., 2008, 11, (4), p. 19:1-19:2410.1145/1380564.1380567
-
(2008)
An analytic framework for modeling and detecting access layer misbehaviorin wireless networks
, vol.11
, Issue.4
-
-
Radosavac, S.1
Moustakides, G.2
Baras, J.3
-
19
-
-
38549155071
-
Proc. IEEE INFOCOM
-
Barcelona, Spain, April
-
Rong, Y., Lee, S., and Choi, H.: 'Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis', Proc. IEEE INFOCOM, Barcelona, Spain, April 2006, p. 1-13
-
(2006)
Detecting stations cheating on backoff rules in 802.11 networks using sequential analysis
, pp. 1-13
-
-
Rong, Y.1
Lee, S.2
Choi, H.3
-
21
-
-
38549096196
-
Proc. IEEE Int. Conf. Communication
-
Glasgow, UK, June
-
Toledo, A., and Wang, X.: 'A robust Kolmogorov-Smirnov detector for misbehavior in IEEE 802.11 DCF', Proc. IEEE Int. Conf. Communication, Glasgow, UK, June 2007, p. 1564-1569
-
(2007)
A robust Kolmogorov-Smirnov detector for misbehavior in IEEE 802.11 DCF
, pp. 1564-1569
-
-
Toledo, A.1
Wang, X.2
-
22
-
-
34547488337
-
IEEE J. Sel. Areas Commun.
-
10.1109/JSAC.2007.070807, 0733-8716
-
Toledo, A., and Wang, X.: 'Robust detection of selfish misbehavior in wireless networks', IEEE J. Sel. Areas Commun., 2007, 25, (6), p. 1124-113410.1109/JSAC.2007.070807 0733-8716
-
(2007)
Robust detection of selfish misbehavior in wireless networks
, vol.25
, Issue.6
, pp. 1124-1134
-
-
Toledo, A.1
Wang, X.2
-
23
-
-
70449489405
-
Proc. IEEE Int. Conf. Communication
-
Dresden, Germany, June
-
Liu, C., Shu, Y., Yang, O., and Li, M.: 'A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks', Proc. IEEE Int. Conf. Communication, Dresden, Germany, June 2009, p. 519-643
-
(2009)
A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks
, pp. 519-643
-
-
Liu, C.1
Shu, Y.2
Yang, O.3
Li, M.4
-
24
-
-
0002916530
-
Biometrika
-
10.1093/biomet/41.1-2.100, 0006-3444
-
Page, E.S.: 'Continuous inspection schemes', Biometrika, 1954, 41, (1-2), p. 100-11510.1093/biomet/41.1-2.100 0006-3444
-
(1954)
Continuous inspection schemes
, vol.41
, Issue.1-2
, pp. 100-115
-
-
Page, E.S.1
-
26
-
-
57949107783
-
Proc. 2008 IFIP Int. Conf. Network and Parallel Computing
-
Shanghai, China, October
-
Ahmed, E., Clark, A., and Mohay, G.: 'A novel sliding window based change detection algorithm for asymmetric traffic', Proc. 2008 IFIP Int. Conf. Network and Parallel Computing, Shanghai, China, October 2008, p. 168-175
-
(2008)
A novel sliding window based change detection algorithm for asymmetric traffic
, pp. 168-175
-
-
Ahmed, E.1
Clark, A.2
Mohay, G.3
-
27
-
-
38149018453
-
-
(LNCS, 4861)
-
Li, L., Zhou, J., and Xiao, N.: 'DDoS attack detection algorithms based on entropy computing', 2007), p. 452-466 (LNCS, 4861)
-
(2007)
DDoS attack detection algorithms based on entropy computing
, pp. 452-466
-
-
Li, L.1
Zhou, J.2
Xiao, N.3
-
28
-
-
0036343692
-
Proc. INFOCOM
-
NY, USA, June
-
Wang, H., Zhang, D., and Shin, K.: 'Detecting SYN flooding attacks', Proc. INFOCOM, NY, USA, June 2002, p. 1530-1539
-
(2002)
Detecting SYN flooding attacks
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
29
-
-
14644397228
-
IEEE Trans. Dependable Secur. Comput.
-
10.1109/TDSC.2004.34, 1545-5971
-
Wang, H., Zhang, D., and Shin, K.: 'Change-point monitoring for the detection of DoS attacks', IEEE Trans. Dependable Secur. Comput., 2004, 1, (4), p. 193-20810.1109/TDSC.2004.34 1545-5971
-
(2004)
Change-point monitoring for the detection of DoS attacks
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
30
-
-
0036375286
-
Proc. 22nd IEEE Int. Conf. Distributed Computing Systems
-
Vienna, Austria, July
-
Wang, H., Zhang, D., and Shin, K.: 'SYN-dog: sniffing SYN flooding sources', Proc. 22nd IEEE Int. Conf. Distributed Computing Systems, Vienna, Austria, July 2002, p. 421-428
-
(2002)
SYN-dog: sniffing SYN flooding sources
, pp. 421-428
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
31
-
-
80155162764
-
-
ISO/IEC 8802-11:1999(E): 'IEEE standard for wireless LAN medium access control (MAC) and physical layer (PHY) specifications', August 1999
-
ISO/IEC 8802-11:1999(E): 'IEEE standard for wireless LAN medium access control (MAC) and physical layer (PHY) specifications', August 1999
-
-
-
-
33
-
-
80155186439
-
-
Scalable Network Technologies: 'Qualnet simulator version 3.9'
-
Scalable Network Technologies: 'Qualnet simulator version 3.9', www.scalable-networks.com
-
-
-
|