-
2
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks, tools and countermeasures
-
San Francisco, CA, USA, 15-17 September
-
Specht SM, Lee RB,. Distributed denial of service: taxonomies of attacks, tools and countermeasures. Proceedings of the International Workshop on Security in Parallel and Distributed Systems, San Francisco, CA, USA, 15-17 September 2004; 543-550.
-
(2004)
Proceedings of the International Workshop on Security in Parallel and Distributed Systems
, pp. 543-550
-
-
Specht, S.M.1
Lee, R.B.2
-
3
-
-
73349103437
-
DDoS attack detection using three-state partition based on flow interaction
-
Springer: New York
-
Cheng J, Zhang B, Yin J, Liu Y, Cai Z,. DDoS attack detection using three-state partition based on flow interaction. In Communications in Computer and Information Science, Vol. 58, Springer: New York, 2009; 176-184.
-
(2009)
Communications in Computer and Information Science
, vol.58
, pp. 176-184
-
-
Cheng, J.1
Zhang, B.2
Yin, J.3
Liu, Y.4
Cai, Z.5
-
4
-
-
65249160136
-
Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC
-
Rachedi A, Benslimane A,. Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC. Wireless Communications and Mobile Computing 2009; 9 (4): 469-488.
-
(2009)
Wireless Communications and Mobile Computing
, vol.9
, Issue.4
, pp. 469-488
-
-
Rachedi, A.1
Benslimane, A.2
-
5
-
-
67349109409
-
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
-
Bicakci K, Tavli B,. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. ACM Journal of Computer Standards & Interfaces 2009; 31 (5): 931-941.
-
(2009)
ACM Journal of Computer Standards & Interfaces
, vol.31
, Issue.5
, pp. 931-941
-
-
Bicakci, K.1
Tavli, B.2
-
6
-
-
80054071642
-
Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems
-
San Jose, CA, USA, 25-29 October
-
Zhou Y, Wu D, Nettles SM,. Analyzing and preventing MAC-layer denial of service attacks for stock 802.11 systems. Proceedings of the IEEE Workshop on Broadband Wireless Services and Applications (BWSA '04), San Jose, CA, USA, 25-29 October 2004; 1103-1106.
-
(2004)
Proceedings of the IEEE Workshop on Broadband Wireless Services and Applications (BWSA '04)
, pp. 1103-1106
-
-
Zhou, Y.1
Wu, D.2
Nettles, S.M.3
-
7
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington, D.C., USA, 4-8 August
-
Bellardo J, Savage S,. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. Proceedings of 12th USENIX Security Symposium, Washington, D.C., USA, 4-8 August 2003; 15-28.
-
(2003)
Proceedings of 12th USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
8
-
-
24144449882
-
Dos analysis of reservation based MAC protocols
-
Seoul, Korea, 16-20 May
-
Negi R, Rajeswaran A,. Dos analysis of reservation based MAC protocols. Proceedings of the IEEE International Conference on Communications (ICC '05), Seoul, Korea, vol. 5, 16-20 May 2005; 3632-3636.
-
(2005)
Proceedings of the IEEE International Conference on Communications (ICC '05)
, vol.5
, pp. 3632-3636
-
-
Negi, R.1
Rajeswaran, A.2
-
9
-
-
79955055383
-
Protecting wireless networks against a denial of service attack based on virtual jamming
-
San Diego, CA, USA, 14-19 September
-
Chen D, Ding J, Varshney PK,. Protecting wireless networks against a denial of service attack based on virtual jamming. Proceedings of the ACM 9th International Conference on Mobile Computing and Networking (MobiCom '03), San Diego, CA, USA, 14-19 September 2003; 1-2.
-
(2003)
Proceedings of the ACM 9th International Conference on Mobile Computing and Networking (MobiCom '03)
, pp. 1-2
-
-
Chen, D.1
Ding, J.2
Varshney, P.K.3
-
10
-
-
85086952977
-
Anomaly detection of the NAV attack in MAC layer under non-time and time-constrained environment
-
Bangalore, India, 11-13 April
-
Sugantha K, Shanmugavel S,. Anomaly detection of the NAV attack in MAC layer under non-time and time-constrained environment. Proceedings of the IEEE International Conference on Wireless and Optical Communications Networks (IFIP '06), Bangalore, India, 11-13 April 2006; 0-5.
-
(2006)
Proceedings of the IEEE International Conference on Wireless and Optical Communications Networks (IFIP '06)
, pp. 0-5
-
-
Sugantha, K.1
Shanmugavel, S.2
-
11
-
-
79952370114
-
A statistical approach to detect NAV attack at MAC layer
-
London, UK, 23-26 May
-
Sugantha K, Shanmugavel S,. A statistical approach to detect NAV attack at MAC layer. Proceedings of the International Workshop on Wireless Ad-Hoc Networks (IWWAN '05), London, UK, 23-26 May 2005; 6.
-
(2005)
Proceedings of the International Workshop on Wireless Ad-Hoc Networks (IWWAN '05)
, pp. 6
-
-
Sugantha, K.1
Shanmugavel, S.2
-
12
-
-
67249091001
-
Jamming ACK attack to wireless networks and a mitigation approach
-
New Orleans, LO, USA, 30 November-4 December
-
Zhang Z, Wu J, Deng J, Qiu M,. Jamming ACK attack to wireless networks and a mitigation approach Proceeding of the IEEE Global Telecommunications Conference, Wireless Networking Symposium (GLOBECOM '08), New Orleans, LO, USA, 30 November-4 December 2008; 1-5.
-
(2008)
Proceeding of the IEEE Global Telecommunications Conference, Wireless Networking Symposium (GLOBECOM '08)
, pp. 1-5
-
-
Zhang, Z.1
Wu, J.2
Deng, J.3
Qiu, M.4
-
15
-
-
67650248939
-
Synchronization and beaconing in IEEE 802.11s mesh networks
-
Saint Petersburg, Russia, 16-19 June
-
Safonov A, Lyakhov A, Sharov S,. Synchronization and beaconing in IEEE 802.11s mesh networks. Proceedings of the IEEE International conference on telecommunication (ICT '08), Saint Petersburg, Russia, 16-19 June 2008; 1-6.
-
(2008)
Proceedings of the IEEE International Conference on Telecommunication (ICT '08)
, pp. 1-6
-
-
Safonov, A.1
Lyakhov, A.2
Sharov, S.3
-
18
-
-
71549132520
-
Distinguishing attack and second-preimage attack on the CBC-like MACs
-
Springer: New York
-
Jia K, Wang X, Yuan Z, Xu G,. Distinguishing attack and second-preimage attack on the CBC-like MACs. In Lecture Notes in Computer Science (LNCS), Vol. 5888. Springer: New York, 2009; 349-361.
-
(2009)
Lecture Notes in Computer Science (LNCS)
, vol.5888
, pp. 349-361
-
-
Jia, K.1
Wang, X.2
Yuan, Z.3
Xu, G.4
-
19
-
-
51849140875
-
Key-recovery attacks on universal hash function based MAC algorithms
-
Springer: New York
-
Handschuh H, Preneel B,. Key-recovery attacks on universal hash function based MAC algorithms. In Lecture Notes in Computer Science (LNCS), Vol. 5157. Springer: New York, 2008; 144-161.
-
(2008)
Lecture Notes in Computer Science (LNCS)
, vol.5157
, pp. 144-161
-
-
Handschuh, H.1
Preneel, B.2
-
20
-
-
77951753468
-
-
NIST Special Publication SP 800-107, National Institute of Standards and Technology, Gaithersburg, MD, USA
-
Dang Q,. Recommendation for Applications Using Approved Hash Algorithms. NIST Special Publication SP 800-107, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2009.
-
(2009)
Recommendation for Applications Using Approved Hash Algorithms
-
-
Dang, Q.1
|