-
1
-
-
84860404798
-
-
by Mofreh Salem*, Amany Sarhan**, Mostafa Abu-Bakr* ICGST-CNIR, July
-
A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks by Mofreh Salem*, Amany Sarhan**, Mostafa Abu-Bakr* ICGST-CNIR, Volume (7), Issue (I), July 2007
-
(2007)
A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks
, vol.7
, Issue.1
-
-
-
2
-
-
29844457889
-
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
-
by Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood, In
-
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks by Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood, In Proceedings of the Sixth ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc), 2005.
-
(2005)
Proceedings of the Sixth ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc)
-
-
-
3
-
-
70349147920
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
in
-
W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel surfing and spatial retreats: defenses against wireless denial of service, " in Proc. of WiSe, 2004,
-
(2004)
Proc. of WiSe
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
4
-
-
29844445404
-
Low-power DoS attacks in data wireless LANs and countermeasures
-
in
-
G. Noubir and G. Lin, "Low-power DoS attacks in data wireless LANs and countermeasures, " in Proc. of MobiHoc, 2003
-
(2003)
Proc. of MobiHoc
-
-
Noubir, G.1
Lin, G.2
-
6
-
-
51349091564
-
On the Performance of IEEE 802.11 under Jamming
-
in
-
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, "On the Performance of IEEE 802.11 under Jamming, " in Proc. of IEEE INFOCOM, 2008.
-
(2008)
Proc. of IEEE INFOCOM
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
7
-
-
0036167973
-
A Multi-Channel MAC protocol with Power Control for Multi-Hop Mobile Ad Hoc Networks
-
S.-L. Wu, C.-Y. Lin, Y.-C. Tseng, C.-Y. Lin, and J.-P. Sheu, "A Multi-Channel MAC protocol with Power Control for Multi-Hop Mobile Ad Hoc Networks, " The Computer J., vol. 45, no. 1, pp. 101-110, 2002.
-
(2002)
The Computer J
, vol.45
, Issue.1
, pp. 101-110
-
-
Wu, S.-L.1
Lin, C.-Y.2
Tseng, Y.-C.3
Lin, C.-Y.4
Sheu, J.-P.5
-
10
-
-
13844296408
-
Cognitive radio: Brain-empowered wireless communications
-
Feb
-
S. Haykin. Cognitive radio: brain-empowered wireless communications. IEEE J. Select. Area Commun., 23(2):201-220, Feb. 2005.
-
(2005)
IEEE J. Select. Area Commun
, vol.23
, Issue.2
, pp. 201-220
-
-
Haykin, S.1
-
11
-
-
84860404794
-
Design of Anti-Jamming Coding for Cognitive Radio
-
New York, in Proc. IEEE Global Telecom. Conf. (Globecom), Washington, DC, Nov
-
Guosen Yue, Xiaodong Wang, Mohammad Madihian "Design of Anti-Jamming Coding for Cognitive Radio" NEC Laboratory America and Dept of Electrical Eng Columbia University, New York, in Proc. IEEE Global Telecom. Conf. (Globecom), Washington, DC, Nov. 2007.
-
(2007)
NEC Laboratory America and Dept of Electrical Eng Columbia University
-
-
Yue, G.1
Wang, X.2
Madihian, M.3
-
12
-
-
24144485419
-
Collaboration and fairness in opportunistic spectrum access
-
In, Seoul, Korea, May
-
H. Zheng and C. Peng. Collaboration and fairness in opportunistic spectrum access. In Proc. of Int. Conf. Commun. (ICC), pages 3132-3136, Seoul, Korea, May 2005
-
(2005)
Proc. of Int. Conf. Commun. (ICC)
, pp. 3132-3136
-
-
Zheng, H.1
Peng, C.2
-
13
-
-
71749093438
-
-
Ramjee Prasad Publisher John Wiley and Sons
-
Kwang-Cheng Chen "Cognitive Radio Networks", Ramjee Prasad Publisher John Wiley and Sons, 2009
-
(2009)
Cognitive Radio Networks
-
-
Chen, K.-C.1
-
16
-
-
0003652589
-
Introduction to Spread-Spectrum Communications
-
By Roger L. Peterson (Motorola), Rodger E. Ziemer (University of Co. at Colorado Springs), and David E. Borth (Motorola) Prentice Hall, (Navtech order #2430)
-
Introduction to Spread-Spectrum Communications By Roger L. Peterson (Motorola), Rodger E. Ziemer (University of Co. at Colorado Springs), and David E. Borth (Motorola) Prentice Hall, 1995 (Navtech order #2430)
-
(1995)
-
-
-
17
-
-
42149164305
-
A multi-channel defense against jamming attacks in wireless sensor networks
-
In
-
G. Alnifie, R. Simon, "A multi-channel defense against jamming attacks in wireless sensor networks" In Proc. of Q2 SWinet '07, pages 95-104, 2007.
-
(2007)
Proc. of Q2 SWinet '07
, pp. 95-104
-
-
Alnifie, G.1
Simon, R.2
-
18
-
-
0348195762
-
JAM: A jammed-area mapping service for sensor networks
-
in
-
A. D. Wood, J. A. Stankovic, and S. H. Son, "JAM: A jammed-area mapping service for sensor networks, " in Proc. of RTSS, 2003.
-
(2003)
Proc. of RTSS
-
-
Wood, A.D.1
Stankovic, J.A.2
Son, S.H.3
-
19
-
-
84860410449
-
Channel Surfing: Defending Wireless Sensor Networks from Interference
-
In
-
W. Xu, W. Trappe, and Y. Zhang, "Channel Surfing: Defending Wireless Sensor Networks from Interference" In Proc. of Workshop on Wireless Security, page 80 U{double acute accent} 89, 2004.
-
(2004)
Proc. of Workshop on Wireless Security
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
23
-
-
55849130364
-
Energy-Efficient predictive jamming holes detection protocol for wireless sensor networks
-
P. Soreanu, Z. Volkovich and Z. Barzily, "Energy-Efficient predictive jamming holes detection protocol for wireless sensor networks" conference of sensor networks, 2008
-
(2008)
Conference of sensor networks
-
-
Soreanu, P.1
Volkovich, Z.2
Barzily, Z.3
-
25
-
-
33747378828
-
Jamming attack detection and countermeasures in wireless sensor network using And System
-
Orlando
-
R. Muraleedharam and L.A. Osadciw, "Jamming attack detection and countermeasures in wireless sensor network using And System" SPIE Defence and Security, Orlando, 2006
-
(2006)
SPIE Defence and Security
-
-
Muraleedharam, R.1
Osadciw, L.A.2
-
26
-
-
33748071789
-
Starvation Mitigation Through MultiChannel Coordination in CSMA Multihop Wireless Networks
-
J. Shi, T. Salonidis, and E.W. Knightly, "Starvation Mitigation Through MultiChannel Coordination in CSMA Multihop Wireless Networks" Proc. ACM MobiHoc, 2006.
-
(2006)
Proc. ACM MobiHoc
-
-
Shi, J.1
Salonidis, T.2
Knightly, E.W.3
-
28
-
-
33751039072
-
-
MobiCom'06, September 23-26
-
A. Mishra, V. Shrivastava, D. Agarwal, S. Banerjee, S. Ganguly, "Distributed Channel Management in Uncoordinated Wireless Environments" MobiCom'06, September 23-26, 2006
-
(2006)
Distributed Channel Management in Uncoordinated Wireless Environments
-
-
Mishra, A.1
Shrivastava, V.2
Agarwal, D.3
Banerjee, S.4
Ganguly, S.5
-
31
-
-
84918847751
-
-
http://home.davidson.com.au/products/wireless/crossbo w/pdf/micz.pdf
-
-
-
-
37
-
-
70349107957
-
Jamming for good: A fresh approach to authentic communication in WSNs
-
I. Martinovic, P. Pichota, J.B. Schmitt, "Jamming for good: a fresh approach to authentic communication in WSNs", ACM 2009
-
(2009)
ACM
-
-
Martinovic, I.1
Pichota, P.2
Schmitt, J.B.3
-
38
-
-
33845635202
-
Worhole-based antijamming techniques in sensor networks
-
M. Čagalj, S. Čapkun, and J.-P. Hubaux, "Wormhole-based antijamming techniques in sensor networks, " IEEE TMC, vol. 6, no. 1, 2007
-
(2007)
IEEE TMC
, vol.6
, Issue.1
-
-
Čagalj, M.1
Čapkun, S.2
Hubaux, J.-P.3
-
42
-
-
34249822230
-
Wireless Security Through RF Fingerprinting
-
Winter
-
Ureten O. and N. Serinken, "Wireless Security Through RF Fingerprinting, "Canadian Journal of Electrical and Computer Engineering, vol. 32, no. 1, pp. 27-33, Winter 2007
-
(2007)
Canadian Journal of Electrical and Computer Engineering
, vol.32
, Issue.1
, pp. 27-33
-
-
Ureten, O.1
Serinken, N.2
-
43
-
-
49049121983
-
Intelligent Jamming Attacks, Counterattacks and (Counter)2 Attacks in 802.11b Wireless Networks
-
in, Washington DC, USA, August
-
M. Acharya and D. Thuente, _Intelligent Jamming Attacks, Counterattacks and (Counter)2 Attacks in 802.11b Wireless Networks, in Proceedings of the OPNETWORK-2005 Conference, Washington DC, USA, August 2005.
-
(2005)
Proceedings of the OPNETWORK-2005 Conference
-
-
Acharya, M.1
Thuente, D.2
-
44
-
-
84918847749
-
-
Greece June 9-June 25 ISBN: 0-7695-2858-9
-
V. Chatzigiannakis, G. Androulidakis, K. Pelechrinis, S. Papavassiliou, and V. Aglaris, Data fusion algorithms for network anomaly detection: classification and evaluation International Conference on Networking and Services (ICNS '07) Athens, Greece June 9-June 25 ISBN: 0-7695-2858-9
-
Data fusion algorithms for network anomaly detection: Classification and evaluation International Conference on Networking and Services (ICNS '07) Athens
-
-
Chatzigiannakis, V.1
Androulidakis, G.2
Pelechrinis, K.3
Papavassiliou, S.4
Aglaris, V.5
|