-
1
-
-
0020831766
-
CSMA with collision avoidance
-
Oct.
-
A. Colvin, "CSMA with collision avoidance," Computer Communications, vol. 6, no. 5, pp. 227-35, Oct. 1983.
-
(1983)
Computer Communications
, vol.6
, Issue.5
, pp. 227-35
-
-
Colvin, A.1
-
2
-
-
0030609296
-
Solutions to hidden terminal problems in wireless networks
-
Sept.
-
Chane L Fullmer and JJ Garcia-Luna-Aceves, "Solutions to hidden terminal problems in wireless networks," ACM SIGCOMM, vol. 27, no. 4, pp. 39-49, Sept. 1997.
-
(1997)
ACM SIGCOMM
, vol.27
, Issue.4
, pp. 39-49
-
-
Fullmer, C.L.1
Garcia-Luna-Aceves, J.J.2
-
3
-
-
0037003792
-
Denial of Service attacks at the MAC layer in wireless ad hoc networks
-
Oct.
-
V. Gupta, S. Krishnamurthy and M. Faloutsos, "Denial of Service attacks at the MAC layer in wireless ad hoc networks," MILCOM 2002, vol. 2, pp. 1118-1123, Oct. 2002.
-
(2002)
MILCOM 2002
, vol.2
, pp. 1118-1123
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
4
-
-
1242287727
-
Low-rate TCP-targeted Denial of Service attacks (The Shrew vs. The Mice and Elephants)
-
Aug.
-
A. Kuzmanovic and E. Knightly, "Low-rate TCP-targeted Denial of Service attacks (The Shrew vs. The Mice and Elephants)," ACM SIGCOMM 03, pp. 75-86, Aug. 2003.
-
(2003)
ACM SIGCOMM 03
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.2
-
5
-
-
84925368904
-
802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions
-
Aug.
-
J. Bellardo and S. Savage, "802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions," 12th USENIX Security Symposium, Washington D.C., USA, vol. 12, pp. 2-2, Aug. 2003.
-
(2003)
12th USENIX Security Symposium, Washington D.C., USA
, vol.12
, pp. 2-2
-
-
Bellardo, J.1
Savage, S.2
-
6
-
-
79955055383
-
Protecting wireless networks against a Denial of Service attack based on Virtual jamming
-
CA, USA, Sept. , unpublished.
-
Dazhi Chen, Jing Deng and K. Varshney Pramod, "Protecting wireless networks against a Denial of Service attack based on Virtual jamming," MobiCom 2003, CA, USA, Sept. 2003, unpublished.
-
(2003)
MobiCom 2003
-
-
Chen, D.1
Deng, J.2
Varshney Pramod, K.3
-
7
-
-
84876771192
-
A statistical approach to detect NAV attack at MAC layer
-
London, UK, , unpublished.
-
K. Sugantha and S. Shanmugavel, "A statistical approach to detect NAV attack at MAC layer," International Workshop on Wireless Ad-hoc Networks, London, UK, 2005, unpublished.
-
(2005)
International Workshop on Wireless Ad-hoc Networks
-
-
Sugantha, K.1
Shanmugavel, S.2
-
8
-
-
84876770676
-
-
Matthew Gast, 802.11 Wireless Networks The Definitive Guide, 2nd ed., O'Reilly Media, 2005
-
Matthew Gast, 802.11 Wireless Networks The Definitive Guide, 2nd ed., O'Reilly Media, 2005.
-
-
-
-
10
-
-
42149166675
-
Overhaul of ieee 802.11 modeling and simulation in ns-2
-
Oct.
-
Qi Chen, Felix Schmidt-Eisenlohr, Daniel Jiang, Marc Torrent-Moreno, Luca Delgrossi and Hannes Hartenstein, "Overhaul of ieee 802.11 modeling and simulation in ns-2," MSWiM 07, pp. 159-168, Oct. 2007.
-
(2007)
MSWiM 07
, pp. 159-168
-
-
Chen, Q.1
Schmidt-Eisenlohr, F.2
Jiang, D.3
Torrent-Moreno, M.4
Delgrossi, L.5
Hartenstein, H.6
-
11
-
-
64849109814
-
LDoS attack in ad-hoc network
-
Feb.
-
Yanxiang He, Yi Han, Qiang Cao, Tao Liu and Libing Wu, "LDoS attack in ad-hoc network," WONS 2009, pp. 251-257, Feb. 2009.
-
(2009)
WONS 2009
, pp. 251-257
-
-
He, Y.1
Han, Y.2
Cao, Q.3
Liu, T.4
Wu, L.5
-
12
-
-
78149444755
-
Greedy receivers in IEEE 802.11 Hotspots: Impacts and detection
-
Mi Kyung Han and Lili Qiu, "Greedy receivers in IEEE 802.11 Hotspots: impacts and detection," Dependable and Secure Computing, vol. 7, pp. 410-423, 2010.
-
(2010)
Dependable and Secure Computing
, vol.7
, pp. 410-423
-
-
Kyung Han, M.1
Qiu, L.2
-
13
-
-
84865731679
-
Flow level detection and filtering of low-rate DDoS
-
Oct.
-
Changwang Zhang, Zhiping Cai, Weifeng Chen, Xiapu Luo, Jianping Yin, "Flow level detection and filtering of low-rate DDoS," Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 56, no. 15, pp. 3417-3431, Oct. 2012.
-
(2012)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.56
, Issue.15
, pp. 3417-3431
-
-
Zhang, C.1
Cai, Z.2
Chen, W.3
Luo, X.4
Yin, J.5
|