-
1
-
-
84873738942
-
-
(Online Resources)
-
List of Acronyms and Additional Tables (Online Resources) http://www.icsd.aegean.gr/postgraduates/kkolias/attacks-andcountermea -sures-on-802-16/online-resources.pdf
-
List of Acronyms and Additional Tables
-
-
-
9
-
-
74349102157
-
A prevention approach to scrambling attacks in WiMAX networks
-
15-19 June
-
P.W. Chi, Lei, "A Prevention Approach to Scrambling Attacks in WiMAX Networks," World of Wireless, Mobile and Multimedia Networks & Workshops, 2009. WoWMoM 2009. IEEE International Symposium on a, vol., no., pp.1-8, 15-19 June 2009.
-
(2009)
World of Wireless, Mobile and Multimedia Networks & Workshops, 2009. WoWMoM 2009. IEEE International Symposium on A
, pp. 1-8
-
-
Chi Lei, P.W.1
-
10
-
-
84867877733
-
-
NIST Special Publication 800-127, Gaithersburg, MD, NIST
-
Scarfone Karen, Cyrus Tibbs and Matthew Sexton, 2010, "Guide to Securing WiMAX Wireless Communications Recommendations of the National Institute of Standards and Technology", NIST Special Publication 800- 127, Gaithersburg, MD, NIST, Available at: http://csrc.nist.gov/publications/ nistpubs/800-127/sp800-127.pdf
-
(2010)
Guide to Securing WiMAX Wireless Communications Recommendations of the National Institute of Standards and Technology
-
-
Karen, S.1
Tibbs, C.2
Sexton, M.3
-
15
-
-
67650679649
-
Analysis of mobile WiMAX security: Vulnerabilities and solutions
-
Sept. 29 2008-Oct. 2
-
T. Han, N. Zhang, K. Liu, B. Tang, Y. Liu, "Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions," Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on, vol., no., pp.828-833, Sept. 29 2008-Oct. 2 2008.
-
(2008)
Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on
, pp. 828-833
-
-
Han, T.1
Zhang, N.2
Liu, K.3
Tang, B.4
Liu, Y.5
-
16
-
-
70350227123
-
Collaborative attacks in WiMAX networks
-
B. Bhargava, Y. Zhang, N. Idika, L. Lilien, M. Azarmi, "Collaborative Attacks in WiMAX Networks" Security and Communication Networks, 2: 373391.
-
Security and Communication Networks
, vol.2
, pp. 373391
-
-
Bhargava, B.1
Zhang, Y.2
Idika, N.3
Lilien, L.4
Azarmi, M.5
-
17
-
-
57749189847
-
Vulnerabilities exposing IEEE 802.16e networks to DoS attacks: A survey
-
6-8 Aug.
-
S. Naseer, M. Younus, A.Ahmed, "Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey," Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. Ninth ACIS International Conference on, vol., no., pp.344-349, 6-8 Aug. 2008.
-
(2008)
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. Ninth ACIS International Conference on
, pp. 344-349
-
-
Naseer, S.1
Younus, M.2
Ahmed, A.3
-
18
-
-
84873725431
-
Simulating denial of service attack using WiMAX experimental setup
-
J. Hong Kok Han, M. Yusoff Alias, G. Bok Min, "Simulating Denial of Service Attack Using WiMAX Experimental Setup", International Journal of Network and Mobile Technologies (IJNMT), Vol 2, No. 1, 2011, pp. 30-34.
-
(2011)
International Journal of Network and Mobile Technologies (IJNMT)
, vol.2
, Issue.1
, pp. 30-34
-
-
Hong Kok Han, J.1
Yusoff Alias, M.2
Bok Min, G.3
-
19
-
-
78650335080
-
Traffic analysis for WiMAX network under DDoS attack
-
1-2 Aug.
-
M. Shojaee, N. Movahhedinia, B.T. Ladani, "Traffic Analysis for WiMAX Network Under DDoS Attack," Circuits,Communications and System (PACCS), 2010 Second Pacific-Asia Conference on, vol.1, no., pp.279-283, 1-2 Aug. 2010.
-
(2010)
Circuits,Communications and System (PACCS), 2010 Second Pacific-Asia Conference on
, pp. 279-283
-
-
Shojaee, M.1
Movahhedinia, N.2
Ladani, B.T.3
-
20
-
-
0033749075
-
Performance analysis of the IEEE 802.11 distributed coordination function
-
Mar
-
G.Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function," IEEE J. Sel. Areas Commun., vol.18, no.3, pp.535-547, Mar 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.3
, pp. 535-547
-
-
Bianchi, G.1
-
22
-
-
84873717856
-
A novel initial ranging algorithm for mobile WiMAX (802.16e)
-
February
-
V. V. Girish, V. K. Govindan, S. Baig and V. Yajnanarayana. "A Novel Initial Ranging Algorithm for mobile WiMAX (802.16e)", International Journal of Computer Applications 1(3):95100, February 2010.
-
(2010)
International Journal of Computer Applications
, vol.1
, Issue.3
, pp. 95100
-
-
Girish, V.V.1
Govindan, V.K.2
Baig, S.3
Yajnanarayana, V.4
-
23
-
-
36348937162
-
Performance improvement using dynamic contention window adjustment for initial ranging in IEEE 802.16 P2MP networks
-
11-15 March
-
L. Lin, W. Jia, B. Han, L. Zhang, "Performance Improvement using Dynamic Contention Window Adjustment for Initial Ranging in IEEE 802.16 P2MP Networks," Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, vol., no., pp.1877-1882, 11-15 March 2007.
-
(2007)
Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE
, pp. 1877-1882
-
-
Lin, L.1
Jia, W.2
Han, B.3
Zhang, L.4
-
26
-
-
34547571167
-
Performance evaluation of energy-saving mechanism based on probabilistic sleep interval decision algorithm in IEEE 802.16e
-
July
-
J.R. Lee, D.H. Cho, "Performance Evaluation of Energy-Saving Mechanism Based on Probabilistic Sleep Interval Decision Algorithm in IEEE 802.16e," Vehicular Technology, IEEE Transactions on, vol.56, no.4, pp.1773-1780, July 2007.
-
(2007)
Vehicular Technology, IEEE Transactions on
, vol.56
, Issue.4
, pp. 1773-1780
-
-
Lee, J.R.1
Cho, D.H.2
-
27
-
-
68449104742
-
On the detection of signaling DoS attacks on 3G/WiMAX wireless networks
-
12 October
-
P.C. Lee, T. Bu, T. Woo, "On the Detection of Signaling DoS Attacks on 3G/WiMAX Wireless Networks", Computer Networks, Volume 53, Issue 15, pp. 2601-2616, 12 October 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.15
, pp. 2601-2616
-
-
Lee, P.C.1
Bu, T.2
Woo, T.3
-
28
-
-
70749139880
-
Power saving mechanisms of IEEE 802.16e: Sleep mode vs. idle mode
-
B. Kim, J. Park, Y.-H. Choi, "Power Saving Mechanisms of IEEE 802.16e: Sleep Mode vs. Idle Mode," Lecture Notes in Computer Science, vol. 4331, pp. 332-340, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4331
, pp. 332-340
-
-
Kim, B.1
Park, J.2
Choi, Y.-H.3
-
30
-
-
38549178532
-
Security analysis of IEEE 802.16
-
DOI 10.1109/ICC.2007.197, 4288868, 2007 IEEE International Conference on Communications, ICC'07
-
L. Maccari, M. Paoli, R. Fantacci, "Security Analysis of IEEE 802.16" Communications, 2007. ICC '07. IEEE International Conference on, vol., no., pp.1160-1165, 24-28 June 2007. (Pubitemid 351145694)
-
(2007)
IEEE International Conference on Communications
, pp. 1160-1165
-
-
Maccari, L.1
Paoli, M.2
Fantacci, R.3
-
31
-
-
51949089189
-
Shared authentication information for preventing DDoS attacks in mobile WiMAX networks
-
10-12 Jan.
-
Y. Kim H. Lim S., "Shared Authentication Information for Preventing DDoS attacks in Mobile WiMAX Networks," Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, vol., no., pp.765-769, 10-12 Jan. 2008.
-
(2008)
Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
, pp. 765-769
-
-
Kim, Y.1
Lim S, H.2
-
32
-
-
38049024684
-
An analysis of mobile WiMAX security: Vulnerabilities and solutions
-
Springer-Verlag
-
T Shon, W. Choi, "An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions" Lecture Notes in Computer Science, 4658, Springer- Verlag, 2007; 8897.
-
(2007)
Lecture Notes in Computer Science
, vol.4658
, pp. 8897
-
-
Shon, T.1
Choi, W.2
-
33
-
-
67049154498
-
Security vulnerabilities and solutions in mobile WiMAX
-
A. Deininger, S. Kiyomoto, J. Kurihara, T. Tanaka, "Security Vulnerabilities and Solutions in Mobile WiMAX", IJCSNS vol.7, no.11, pp.7-15, 2007.
-
(2007)
IJCSNS
, vol.7
, Issue.11
, pp. 7-15
-
-
Deininger, A.1
Kiyomoto, S.2
Kurihara, J.3
Tanaka, T.4
-
34
-
-
47249121362
-
Attacks on PKM protocols of IEEE 802.16 and its later versions
-
6-8 Sept.
-
S. Xu, C. Huang, "Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions" Wireless Communication Systems, 2006. ISWCS '06. 3rd International Symposium on, vol., no., pp.185-189, 6-8 Sept. 2006.
-
(2006)
Wireless Communication Systems, 2006. ISWCS '06. 3rd International Symposium on
, pp. 185-189
-
-
Xu, S.1
Huang, C.2
-
35
-
-
57749204596
-
Security enhancements for privacy and key management protocol in IEEE 802.16e-2005
-
Aug.
-
A. Altaf, M.Y. Javed, A. Ahmed, "Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005" Proc. IEEE ACIS Intl Conf. Software Eng., Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD), Aug. 2008.
-
(2008)
Proc. IEEE ACIS Intl Conf. Software Eng., Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
-
-
Altaf, A.1
Javed, M.Y.2
Ahmed, A.3
-
36
-
-
52949098405
-
Responding to security issues in WiMAX networks
-
C. Huang, L. Chang, "Responding to Security Issues in WiMAX Networks", IT Professional 2008; 10(5):15-21.
-
(2008)
IT Professional
, vol.10
, Issue.5
, pp. 15-21
-
-
Huang, C.1
Chang, L.2
-
39
-
-
3042685819
-
Overview of IEEE 802.16 security
-
May-June
-
D. Johnston, J. Walker, "Overview of IEEE 802.16 Security," Security & Privacy, IEEE, vol.2, no.3, pp.40-48, May-June 2004.
-
(2004)
Security & Privacy, IEEE
, vol.2
, Issue.3
, pp. 40-48
-
-
Johnston, D.1
Walker, J.2
-
41
-
-
77949571723
-
An overview of WiMAX security
-
M. Ilyas, Ed. Boca Raton, FL: CRCPress
-
E. B. Fernandez, M. VanHilst, "An Overview of WiMAX Security" in WiMAX Standards and Security, M. Ilyas, Ed. Boca Raton, FL: CRCPress, 2008, pp. 197204.
-
(2008)
WiMAX Standards and Security
, pp. 197204
-
-
Fernandez, E.B.1
Vanhilst, M.2
-
42
-
-
84944056982
-
Attacking predictable IPsec ESP initialization vectors
-
Robert H. Deng, Sihan Qing, Feng Bao, and Jianying Zhou (Eds.). Springer- Verlag, London, UK, UK
-
S. Vaarala, A. Nuopponen, T. Virtanen, "Attacking Predictable IPsec ESP Initialization Vectors", In Proc. 4th International Conference on Information and Communications Security (ICICS '02), Robert H. Deng, Sihan Qing, Feng Bao, and Jianying Zhou (Eds.). Springer-Verlag, London, UK, UK, 160-172, 2002.
-
(2002)
Proc. 4th International Conference on Information and Communications Security (ICICS '02)
, pp. 160-172
-
-
Vaarala, S.1
Nuopponen, A.2
Virtanen, T.3
-
43
-
-
77954117749
-
Initialization vector attacks on the IPsec protocol suite
-
Washington, DC, USA
-
C. B. McCubbin, A. A. Sel, D. P. Sidhu, "Initialization Vector Attacks on the IPsec Protocol Suite. In Proc. 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE '00). IEEE Computer Society, Washington, DC, USA, 171- 175, 2000.
-
(2000)
Proc. 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE '00). IEEE Computer Society
, pp. 171-175
-
-
McCubbin, C.B.1
Sel, A.A.2
Sidhu, D.P.3
-
44
-
-
84974667019
-
A chosen-plaintext linear attack on DES
-
Fast Software Encryption
-
L. R. Knudsen, J. E. Mathiassen, "A Chosen-Plaintext Linear Attack on DES", In Proc. 7th International Workshop on Fast Software Encryption (FSE '00), Bruce Schneier (Ed.). Springer-Verlag, London, UK, 262- 272, 2000. (Pubitemid 33236954)
-
(2001)
Lecture Notes in Computer Science
, Issue.1978
, pp. 262-272
-
-
Knudsen, L.R.1
Mathiassen, J.E.2
-
45
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
T. Helleseth, Ed., Springer-Verlag
-
M. Matsui, "Linear Cryptanalysis Method for DES Cipher," Advances in Cryptology, Proceedings Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, pp. 386-397 1994
-
(1994)
Advances in Cryptology, Proceedings Eurocrypt'93, LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
46
-
-
0005317735
-
-
Ph.D. Thesis, Arhus University, Denmark
-
L.R. Knudsen, "Block Ciphers Analysis, Design and Applications", Ph.D. Thesis, Arhus University, Denmark, 1994.
-
(1994)
Block Ciphers Analysis, Design and Applications
-
-
Knudsen, L.R.1
-
48
-
-
77955717620
-
Revisiting WiMAX MBS security
-
Advances in Cryptography Security and Applications for Future Computer Science, July
-
G. Kambourakis, E. Konstantinou, S. Gritzalis, "Revisiting WiMAX MBS security", Computers & Mathematics with Applications, Volume 60, Issue 2, Advances in Cryptography, Security and Applications for Future Computer Science, Pages 217-223, July 2010.
-
(2010)
Computers & Mathematics with Applications
, vol.60
, Issue.2
, pp. 217-223
-
-
Kambourakis, G.1
Konstantinou, E.2
Gritzalis, S.3
-
51
-
-
47949102706
-
A security scheme for centralized scheduling in IEEE 802.16 mesh networks
-
29-31 Oct.
-
B. Kwon, C. Lee, P. Chang Yusun, J. A. Copeland, "A Security Scheme for Centralized Scheduling in IEEE 802.16 Mesh Networks" Military Communications Conference, 2007. MILCOM 2007. IEEE, vol., no., pp.1-5, 29-31 Oct. 2007.
-
(2007)
Military Communications Conference, 2007. MILCOM 2007. IEEE
, pp. 1-5
-
-
Kwon, B.1
Lee, C.2
Chang Yusun, P.3
Copeland, J.A.4
-
52
-
-
62449249898
-
Modeling and analysis of IEEE 802.16 PKM protocols using CasperFDR
-
21-24 Oct.
-
X. Sen, H. Chin-Tser, M.M. Matthews, "Modeling and Analysis of IEEE 802.16 PKM Protocols Using CasperFDR", Wireless Communication Systems. 2008. ISWCS '08. IEEE International Symposium on, vol., no., pp.653-657, 21-24 Oct. 2008.
-
(2008)
Wireless Communication Systems. 2008. ISWCS '08. IEEE International Symposium on
, pp. 653-657
-
-
Sen, X.1
Chin-Tser, H.2
Matthews, M.M.3
-
53
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
Jan.
-
L. Gong, "A Security Risk of Depending on Synchronized Clocks", ACM SIGOPS Operating Systems Review, v.26 n.1, p.49-53, Jan. 1992.
-
(1992)
ACM SIGOPS Operating Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
54
-
-
77956159111
-
A revised secure authentication protocol for IEEE 802.16 (e)
-
20-21 June
-
S. Sreejesh, M.P. Sebastian, "A Revised Secure Authentication Protocol for IEEE 802.16 (e)" Advances in Computer Engineering (ACE), 2010 International Conference on, vol., no., pp.34-38, 20-21 June 2010.
-
(2010)
Advances in Computer Engineering (ACE), 2010 International Conference on
, pp. 34-38
-
-
Sreejesh, S.1
Sebastian, M.P.2
-
55
-
-
77749283146
-
WiMAX security analysis and enhancement
-
21-23 Dec.
-
M.S. Rahman, M.M.S. Kowsar, "WiMAX Security Analysis and Enhancement" Computers and Information Technology, 2009. ICCIT '09. 12th International Conference on, vol., no., pp.679-684, 21-23 Dec. 2009.
-
(2009)
Computers and Information Technology, 2009. ICCIT '09. 12th International Conference on
, pp. 679-684
-
-
Rahman, M.S.1
Kowsar, M.M.S.2
-
56
-
-
0000478762
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
Gilbert S. Vernam, "Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications", Journal of the IEEE, Vol 55, pp109115 (1926).
-
(1926)
Journal of the IEEE
, vol.55
, pp. 109115
-
-
Vernam, G.S.1
-
57
-
-
42749101284
-
A WPKI-based security mechanism for IEEE 802.16e
-
22-24 Sept.
-
F. Liu, L. Lu, "A WPKI-Based Security Mechanism for IEEE 802.16e" Wireless Communications, Networking and Mobile Computing, 2006. WiCOM 2006.International Conference on, vol., no., pp.1-4, 22-24 Sept. 2006.
-
(2006)
Wireless Communications, Networking and Mobile Computing, 2006. WiCOM 2006.International Conference on
, pp. 1-4
-
-
Liu, F.1
Lu, L.2
-
58
-
-
71949089019
-
Security concerns in WiMAX
-
3-5 Nov.
-
S.S. Hasan, M.A. Qadeer, "Security concerns in WiMAX," Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on, vol., no., pp.1-5, 3-5 Nov. 2009.
-
(2009)
Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on
, pp. 1-5
-
-
Hasan, S.S.1
Qadeer, M.A.2
-
59
-
-
77958161771
-
A proposed authentication protocol for mobile users of WiMAX networks
-
11-13 Aug.
-
J. Al-Zaabi, N. Chilamkurti, S. Zeadally, J. Kim, "A Proposed Authentication Protocol for Mobile Users of WiMAX Networks," Human-Centric Computing (HumanCom), 2010 3rd International Conference on, vol., no., pp.1-6, 11-13 Aug. 2010.
-
(2010)
Human-Centric Computing (HumanCom), 2010 3rd International Conference on
, pp. 1-6
-
-
Al-Zaabi, J.1
Chilamkurti, N.2
Zeadally, S.3
Kim, J.4
-
60
-
-
62949117516
-
An improved mutual authentication scheme in multi-hop WiMAX network
-
20-22 Dec.
-
J. Huixia, L. Tu, G. Yang, Y. Yang, "An Improved Mutual Authentication Scheme in Multi-Hop WiMAX Network," Computer and Electrical Engineering, 2008. ICCEE 2008. International Conference on, vol., no., pp.296-299, 20-22 Dec. 2008.
-
(2008)
Computer and Electrical Engineering, 2008. ICCEE 2008. International Conference on
, pp. 296-299
-
-
Huixia, J.1
Tu, L.2
Yang, G.3
Yang, Y.4
-
61
-
-
33947576784
-
Key management protocol of the IEEE 802.16e
-
H. Tian, L. Pang, Y. Wang, "Key Management Protocol of the IEEE 802.16e", Wuhan University Journal of Natural Sciences.2007, 12(1):59- 62.
-
(2007)
Wuhan University Journal of Natural Sciences.
, vol.12
, Issue.1
, pp. 59-62
-
-
Tian, H.1
Pang, L.2
Wang, Y.3
-
62
-
-
84945119254
-
Entity authentication and key distribution
-
M. Bellare, P. Rogaway, "Entity Authentication and Key Distribution", Advances in Cryptology CRYPTO 93, pp. 232-249, vol. 773, 1994.
-
(1994)
Advances in Cryptology CRYPTO 93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
63
-
-
58149083441
-
Experimental research on a new authentication protocol for wireless communication network based on WiMAX
-
12-14 Oct.
-
R. Li, Z. Fang, P. Xu, W. Xiao, W. Wang, "Experimental Research on a New Authentication Protocol for Wireless Communication Network Based on WiMAX," Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on, vol., no., pp.1-4, 12-14 Oct. 2008.
-
(2008)
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
, pp. 1-4
-
-
Li, R.1
Fang, Z.2
Xu, P.3
Xiao, W.4
Wang, W.5
-
65
-
-
35148814392
-
Security of IEEE 802.16 in mesh mode
-
23-25 Oct.
-
Y. Zhou, Y. Fang "Security of IEEE 802.16 in Mesh Mode", Military Communications Conference, 2006. MILCOM 2006. IEEE, vol., no., pp.1-6, 23-25 Oct. 2006.
-
(2006)
Military Communications Conference, 2006. MILCOM 2006. IEEE
, pp. 1-6
-
-
Zhou, Y.1
Fang, Y.2
-
66
-
-
67249151067
-
Enhancing security using the discarded security information in mobile WiMAX networks
-
Nov. 30 2008-Dec. 4
-
Y. Kim, S. Bahk, "Enhancing Security Using the Discarded Security Information in Mobile WiMAX Networks," Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, vol., no., pp.1-5, Nov. 30 2008-Dec. 4 2008.
-
(2008)
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE
, pp. 1-5
-
-
Kim, Y.1
Bahk, S.2
-
67
-
-
51949089189
-
Shared authentication information for preventing DDoS attacks in mobile WiMAX networks
-
10-12 Jan.
-
Y. Kim, H. Lim; S. Bahk, "Shared Authentication Information for Preventing DDoS attacks in Mobile WiMAX Networks," Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, vol., no., pp.765-769, 10-12 Jan. 2008.
-
(2008)
Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
, pp. 765-769
-
-
Kim, Y.1
Lim, H.2
Bahk, S.3
-
68
-
-
34047154513
-
Performance analysis of sleep mode operation in IEEE 802.16e mobile broadband wireless access systems
-
7-10 May
-
Kwanghun Han, Sunghyun Choi "Performance Analysis of Sleep Mode Operation in IEEE 802.16e Mobile Broadband Wireless Access Systems," Vehicular Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd, vol.3, no., pp.1141-1145, 7-10 May 2006.
-
(2006)
Vehicular Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd
, vol.3
, pp. 1141-1145
-
-
Han, K.1
Choi, S.2
-
70
-
-
84861440335
-
Assessing the effect of WiMAX system parameter settings on MAC-level local DoS vulnerability
-
Juan Deng, Richard R. Brooks, and James Martin, "Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability", International Journal of Performability Engineering, 8 (2) 163-178, (2012).
-
(2012)
International Journal of Performability Engineering
, vol.8
, Issue.2
, pp. 163-178
-
-
Deng, J.1
Brooks, R.R.2
Martin, J.3
-
71
-
-
74349119886
-
-
Huawei Technologies Co., Ltd.
-
Huawei Technologies Co., Ltd. Huawei WiMAX Base Station3703. http://www.huawei.com/le/download.do?f=2682
-
Huawei WiMAX Base Station3703
-
-
|