-
2
-
-
82055195987
-
-
Ph.D. dissertation, Brigham Young University, Provo, UT, [Online]. Available, 2083
-
C. Chen, "Secret Key Establishment Using Wireless Channels as Common Randomness in Time-Variant MIMO Systems" Ph.D. dissertation, Brigham Young University, Provo, UT, 2010 [Online]. Available: http://contentdm.lib.byu.edu/ u?/ETD, 2083
-
(2010)
Secret Key Establishment Using Wireless Channels As Common Randomness in Time-Variant MIMO Systems
-
-
Chen, C.1
-
3
-
-
33746781755
-
Perfect identity concealment in UMTS over radio access links
-
Montreal, Canada, Aug. 22-24
-
M. Barbeau and J.-M. Robert, "Perfect identity concealment in UMTS over radio access links," in Proc. IEEE Int. Conf. Wireless and Mobile Computing, Networking and Communications (WiMob), Montreal, Canada, Aug. 22-24, 2005, vol. 2, pp. 72-74.
-
(2005)
Proc. IEEE Int. Conf. Wireless and Mobile Computing, Networking and Communications (WiMob)
, vol.2
, pp. 72-74
-
-
Barbeau, M.1
Robert, J.-M.2
-
4
-
-
33748995703
-
Detecting impersonation attacks in future wireless and mobile networks
-
M. Barbeau, J. Hall, andE. Kranakis, "Detecting impersonation attacks in future wireless and mobile networks," in Proc. Mobile Ad-hoc Networks and Sensors (MADNES)-Workshop on Secure Mobile Ad-hoc Networks and Sensors (Singapore, Sep. 20-22, 2005), 2006, vol. 4074, pp. 80-95, Springer Lecture Notes on Computer Science. (Pubitemid 44453201)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4074
, pp. 80-95
-
-
Barbeau, M.1
Hall, J.2
Kranakis, E.3
-
5
-
-
78751632083
-
Temporal link signature measurements for location distinction
-
Mar
-
N. Patwari and S. K. Kasera, "Temporal link signature measurements for location distinction," IEEE Trans. Mobile Comput. vol. 10, no. 3, pp. 449-462, Mar. 2011.
-
(2011)
IEEE Trans. Mobile Comput.
, vol.10
, Issue.3
, pp. 449-462
-
-
Patwari, N.1
Kasera, S.K.2
-
6
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. ACM Workshop on Wireless Security (WiSe), Los Angeles, CA, Sep. 29, 2006, pp. 43-52. (Pubitemid 46634301)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
7
-
-
0029462943
-
Novel identification of intercepted signals from unknown radio transmitters
-
H. H. Szu, Ed
-
H. C. Choe, C.E. Poole, A. M. Yu, and H. H. Szu, "Novel identification of intercepted signals from unknown radio transmitters," in Proc. SPIE, Wavelet Applications II, H. H. Szu, Ed., 1995, vol. 2491, pp. 504-517.
-
(1995)
Proc. SPIE, Wavelet Applications II
, vol.2491
, pp. 504-517
-
-
Choe, H.C.1
Poole, C.E.2
Yu, A.M.3
Szu, H.H.4
-
8
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
-
433-130, Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology
-
J.Hall, M. Barbeau, and E.Kranakis, "Enhancing intrusion detection in wireless networks using radio frequency fingerprinting," in Proc. 3rd IASTED Int. Conf. Communications, Internet and Information Technology (CIIT), St. Thomas, U.S. Virgin Islands, Nov. 22-24, 2004, pp. 201-206. (Pubitemid 40027216)
-
(2004)
Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology
, pp. 201-206
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
9
-
-
51349157157
-
Implications of radio fingerprinting on the security of sensor networks
-
Nice, France, Sep. 17-21
-
K. B. Rasmussen and S. Capkun, "Implications of radio fingerprinting on the security of sensor networks," in Proc. IEEE Third Int. Conf. Security and Privacy in Communications Networks (SecureComm), Nice, France, Sep. 17-21, 2007, pp. 331-340.
-
(2007)
Proc. IEEE Third Int. Conf. Security and Privacy in Communications Networks (Secure Comm)
, pp. 331-340
-
-
Rasmussen, K.B.1
Capkun, S.2
-
10
-
-
34249822230
-
Wireless security through RF fingerprinting
-
DOI 10.1109/CJECE.2007.364330
-
O. Ureten and N. Serinken, "Wireless security through RF fingerprinting," Can. J. Elect. Comput. Eng., vol. 32, no. 1, pp. 27-33, 2007. (Pubitemid 46852763)
-
(2007)
Canadian Journal of Electrical and Computer Engineering
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
11
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
Vancouver, B.C., Canada, Jul. 31-Aug. 4
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker, "Passive data link layer 802.11 wireless device driver fingerprinting," in Proc. 15th USENIX Security Symp., Vancouver, B.C., Canada, Jul. 31-Aug. 4 2006, pp. 167-178.
-
(2006)
Proc. 15th USENIX Security Symp.
, pp. 167-178
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Van Randwyk, J.5
Sicker, D.6
-
12
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
San Francisco, CA, Sep. 14-19
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proc. 14th ACM Int. Conf. Mobile Computing and Networking (Mobicom), San Francisco, CA, Sep. 14-19, 2008.
-
(2008)
Proc. 14th ACM Int. Conf. Mobile Computing and Networking (Mobicom)
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
13
-
-
24344458137
-
Feature selection based on mutual information: Criteria of Max-Dependency, Max-Relevance, and Min-Redundancy
-
DOI 10.1109/TPAMI.2005.159
-
H. Peng, F. Long, and C. Ding, "Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 8, pp. 1226-1238, Aug. 2005. (Pubitemid 41245053)
-
(2005)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.27
, Issue.8
, pp. 1226-1238
-
-
Peng, H.1
Long, F.2
Ding, C.3
-
14
-
-
84960463485
-
Minimum redundancy feature selection from microarray gene expression data
-
Stanford, CA, Aug. 11-14
-
C. Ding and H. Peng, "Minimum redundancy feature selection from microarray gene expression data," in Proc. IEEE Bioinformatics Conf. (CSB2003), Stanford, CA, Aug. 11-14, 2003, pp. 523-528.
-
(2003)
Proc. IEEE Bioinformatics Conf. (CSB2003)
, pp. 523-528
-
-
Ding, C.1
Peng, H.2
-
15
-
-
4043157158
-
An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions
-
Jul
-
Ö. H. Takbaş, N. Serinken, and O. Üreten, "An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions," Can. J. Elect. Comput. Eng., vol. 29, no. 3, pp. 203-209, Jul. 2004.
-
(2004)
Can. J. Elect. Comput. Eng.
, vol.29
, Issue.3
, pp. 203-209
-
-
Takbaş, Ö.H.1
Serinken, N.2
Üreten, O.3
-
18
-
-
0001447184
-
Neural network studies. 1. Comparison of over fitting and overtraining
-
I. V. Tetko, D. J. Livingstone, and A. I. Luik, "Neural network studies. 1. Comparison of overfitting and overtraining," J. Chem. Inf. Comput. Sci., vol. 35, pp. 826-833, 1995.
-
(1995)
J. Chem. Inf. Comput. Sci.
, vol.35
, pp. 826-833
-
-
Tetko, I.V.1
Livingstone, D.J.2
Luik, A.I.3
-
19
-
-
84898957627
-
For valid generalization, the size of the weights is more important than the size of the network
-
Denver, CO, Dec. 2-5
-
P. L. Bartlett, "For valid generalization, the size of the weights is more important than the size of the network," in Proc. Advances in Neural Information Processing Systems (NIPS), Denver, CO, Dec. 2-5, 1996, vol. 9, pp. 134-140.
-
(1996)
Proc. Advances in Neural Information Processing Systems (NIPS)
, vol.9
, pp. 134-140
-
-
Bartlett, P.L.1
-
20
-
-
0242625243
-
Instability of decision tree classification algorithms
-
Edmonton, Canada, Jul. 23-26
-
R.-H. Li and G. G. Belford, "Instability of decision tree classification algorithms," in Proc. Eighth ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Edmonton, Canada, Jul. 23-26, 2002, pp. 570-575.
-
(2002)
Proc. Eighth ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining
, pp. 570-575
-
-
Li, R.-H.1
Belford, G.G.2
-
21
-
-
0030211964
-
Bagging predictors
-
L. Breiman, "Bagging predictors," Machine Learning, vol. 24, no. 2, pp. 123-140, Aug. 1996. (Pubitemid 126724382)
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
23
-
-
76749092270
-
The WEKA data mining software: An update
-
Jun
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The WEKA data mining software: An update," ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10-18, Jun. 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
24
-
-
0141496153
-
Efficient algorithms for decision tree crossvalidation
-
Dec
-
H. Blockeel and J. Struyf, "Efficient algorithms for decision tree crossvalidation," J. Mach. Learning Res., vol. 3, pp. 621-650, Dec. 2002.
-
(2002)
J. Mach. Learning Res.
, vol.3
, pp. 621-650
-
-
Blockeel, H.1
Struyf, J.2
-
26
-
-
1242298616
-
Improvement of transmitter identification system for low SNR transients
-
Feb. 5
-
Ö. H. Takbaş, O. Üreten, and N. Serinken, "Improvement of transmitter identification system for low SNR transients," Electron. Lett., vol. 40, no. 3, pp. 182-183, Feb. 5, 2004.
-
(2004)
Electron. Lett.
, vol.40
, Issue.3
, pp. 182-183
-
-
Takbaş, Ö.H.1
Üreten, O.2
Serinken, N.3
|