-
1
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Berkeley, CA, USA USENIX Association
-
Bellardo, J., and Savage, S. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX Security Symposium (Berkeley, CA, USA, 2003), USENIX Association.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
4
-
-
67650679649
-
Analysis of mobile WiMAX security: Vulnerabilities and solutions
-
MASS 2008. 5th IEEE International Conference on
-
Han, T., Zhang, N., Liu, K., Tang, B., and Liu, Y. Analysis of mobile WiMAX security: Vulnerabilities and solutions. In Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on (2008), pp. 828-833.
-
(2008)
Mobile Ad Hoc and Sensor Systems, 2008
, pp. 828-833
-
-
Han, T.1
Zhang, N.2
Liu, K.3
Tang, B.4
Liu, Y.5
-
5
-
-
0242581943
-
Spin model checker
-
first ed. Addison-Wesley Professional
-
Holzmann, G. Spin model checker, the: primer and reference manual, first ed. Addison-Wesley Professional, 2003.
-
(2003)
The: Primer and Reference Manual
-
-
Holzmann, G.1
-
6
-
-
21644460506
-
-
IEEE New York, NY, USA
-
IEEE. IEEE Std 802.11g-2003. New York, NY, USA, 2003.
-
(2003)
IEEE Std 802.11g-2003
-
-
-
10
-
-
70350650693
-
Signaling-oriented DoS attacks in UMTS networks
-
Springer-Verlag
-
Kambourakis, G., Kolias, C., Gritzalis, S., and Hyuk-Park, J. Signaling-oriented DoS attacks in UMTS networks. In Advances in Information Security and Assurance, vol. 5576 of Lecture Notes in Computer Science. Springer-Verlag, 2009, pp. 280-289.
-
(2009)
Advances in Information Security and Assurance, Vol. 5576 of Lecture Notes in Computer Science
, pp. 280-289
-
-
Kambourakis, G.1
Kolias, C.2
Gritzalis, S.3
Hyuk-Park, J.4
-
11
-
-
77951273497
-
Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard
-
Könings, B., Schaub, F., Kargl, F., and Dietzel, S. Channel switch and quiet attack: New DoS attacks exploiting the 802.11 standard. In LCN 2009: Proceedings of the IEEE 34th Conference on Local Computer Networks (2009), pp. 14-21.
-
LCN 2009: Proceedings of the IEEE 34th Conference on Local Computer Networks (2009)
, pp. 14-21
-
-
Könings, B.1
Schaub, F.2
Kargl, F.3
Dietzel, S.4
-
13
-
-
28144444844
-
Game-based analysis of denial-of-service prevention protocols
-
Proceedings of the 18th IEEE Computer Security Foundations Workshop
-
Mahimkar, A., and Shmatikov, V. Game-based analysis of denial-of-service prevention protocols. In Proceedings of the 18th IEEE workshop on Computer Security Foundations (Washington, DC, USA, 2005), IEEE Computer Society, pp. 287-301. (Pubitemid 41696436)
-
(2005)
Proceedings of the Computer Security Foundations Workshop
, pp. 287-301
-
-
Mahimkar, A.1
Shmatikov, V.2
-
16
-
-
0032664157
-
A formal framework and evaluation method for network denial of service
-
Meadows, C. A formal framework and evaluation method for network denial of service. IEEE Computer Security Foundations Workshop 00 (1999), 4.
-
(1999)
IEEE Computer Security Foundations Workshop
, pp. 4
-
-
Meadows, C.1
-
17
-
-
46249123717
-
Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA+
-
2nd IEEE Workshop on
-
Narayana, P., Chen, R., Zhao, Y., Chen, Y., Fu, Z., and Zhou, H. Automatic vulnerability checking of IEEE 802.16 WiMAX protocols through TLA+. In Secure Network Protocols, 2006. 2nd IEEE Workshop on (2006), pp. 44-49.
-
(2006)
Secure Network Protocols, 2006
, pp. 44-49
-
-
Narayana, P.1
Chen, R.2
Zhao, Y.3
Chen, Y.4
Fu, Z.5
Zhou, H.6
-
18
-
-
81055157666
-
Denial of service attacks in wireless networks: The case of jammers
-
Pelechrinis, K., Iliofotou, M., and Krishnamurthy, V. Denial of service attacks in wireless networks: The case of jammers. Communications Surveys Tutorials, IEEE PP, 99 (2010), 1-13.
-
(2010)
Communications Surveys Tutorials, IEEE PP
, vol.99
, pp. 1-13
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, V.3
-
19
-
-
28144453915
-
Analyzing DoS-resistance of protocols using a cost-based framework
-
Ramachandran, V. Analyzing DoS-resistance of protocols using a cost-based framework. Tech. rep., Yale University, 2002.
-
(2002)
Tech. Rep., Yale University
-
-
Ramachandran, V.1
-
20
-
-
62149116869
-
Network access security in next-generation 3GPP systems: A tutorial
-
IEEE
-
Sankaran, C. Network access security in next-generation 3GPP systems: A tutorial. Communications Magazine, IEEE 47, 2 (2009), 84-91.
-
(2009)
Communications Magazine
, vol.47
, Issue.2
, pp. 84-91
-
-
Sankaran, C.1
|