-
1
-
-
57549097287
-
A jamming-resistant mac protocol for single-hop wireless networks
-
B. Awerbuch, A. Richa, and C. Scheideler. A jamming-resistant mac protocol for single-hop wireless networks. In PODC, pages 45-54, 2008.
-
(2008)
PODC
, pp. 45-54
-
-
Awerbuch, B.1
Richa, A.2
Scheideler, C.3
-
2
-
-
32144452400
-
Adversarial contention resolution for simple channels
-
M. Bender, M. Farach-Colton, S. He, B. Kuszmaul, and C. Leiserson. Adversarial contention resolution for simple channels. In SPAA, pages 325-332, 2005.
-
(2005)
SPAA
, pp. 325-332
-
-
Bender, M.1
Farach-Colton, M.2
He, S.3
Kuszmaul, B.4
Leiserson, C.5
-
3
-
-
32844470517
-
Phased arrays and radars - Past, present and future
-
ISSN 01926225
-
E. Brookner. Phased arrays and radars - past, present and future. Microwave Journal, 49(1):24-46, 2006. ISSN 01926225.
-
(2006)
Microwave Journal
, vol.49
, Issue.1
, pp. 24-46
-
-
Brookner, E.1
-
4
-
-
38949138133
-
Phased-array radar: Past, astounding breakthroughs, and future trends
-
ISSN 01926225
-
E. Brookner. Phased-array radar: Past, astounding breakthroughs, and future trends. Microwave Journal, 51(1):30-50, 2008. ISSN 01926225.
-
(2008)
Microwave Journal
, vol.51
, Issue.1
, pp. 30-50
-
-
Brookner, E.1
-
6
-
-
85180418432
-
A practical, targeted, and stealthy attack against wpa enterprise authentication
-
A. Cassola, W. Robertson, E. Kirda, and G. Noubir. A practical, targeted, and stealthy attack against wpa enterprise authentication. In Proceedings of NDSS, 2013.
-
(2013)
Proceedings of NDSS
-
-
Cassola, A.1
Robertson, W.2
Kirda, E.3
Noubir, G.4
-
7
-
-
51349125793
-
Dynamic jamming mitigation for wireless broadcast networks
-
J. Chiang and Y.-C. Hu. Dynamic jamming mitigation for wireless broadcast networks. In INFOCOM, pages 1211-1219, 2008.
-
(2008)
INFOCOM
, pp. 1211-1219
-
-
Chiang, J.1
Hu, Y.-C.2
-
8
-
-
78649281129
-
Achieving single channel, full duplex wireless communication
-
J. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti. Achieving single channel, full duplex wireless communication. In MOBICOM, pages 1-12, 2010.
-
(2010)
MOBICOM
, pp. 1-12
-
-
Choi, J.1
Jain, M.2
Srinivasan, K.3
Levis, P.4
Katti, S.5
-
9
-
-
70349146976
-
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
-
J. Dong, R. Curtmola, and C. Nita-Rotaru. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. In In Proceedings of WiSec, pages 111-122, 2009.
-
(2009)
Proceedings of WiSec
, pp. 111-122
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
10
-
-
84879519414
-
-
http://transition.fcc.gov/eb/News-Releases/DOC-304575A1.html
-
FCC. Jammer enforcement, 2012. http://www.fcc.gov/encyclopedia/jammer- enforcement, http://transition.fcc.gov/eb/News-Releases/DOC-304575A1.html.
-
(2012)
Jammer Enforcement
-
-
-
11
-
-
38049049434
-
Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
-
S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In OPODIS, 2006.
-
(2006)
OPODIS
-
-
Gilbert, S.1
Guerraoui, R.2
Newport, C.3
-
12
-
-
77958042149
-
-
GNU. Gnu radio. http://www.gnuradio.org.
-
Gnu Radio
-
-
-
13
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In SIGCOMM, pages 2-13, 2011.
-
(2011)
SIGCOMM
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
15
-
-
80053601254
-
Practical, real-time, full duplex wireless
-
Las Vegas, USA
-
M. Jain, J. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis, S. Katti, and P. Sinha. Practical, real-time, full duplex wireless. In Proceedings of international conference on Mobile computing and networking, pages 301-312, Las Vegas, USA, 2011.
-
(2011)
Proceedings of International Conference on Mobile Computing and Networking
, pp. 301-312
-
-
Jain, M.1
Choi, J.2
Kim, T.3
Bharadia, D.4
Seth, S.5
Srinivasan, K.6
Levis, P.7
Katti, S.8
Sinha, P.9
-
16
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
T. Jin, G. Noubir, and B. Thapa. Zero pre-shared secret key establishment in the presence of jammers. In In Proceedings of ACM MobiHoc, pages 219-228, 2009.
-
(2009)
Proceedings of ACM MobiHoc
, pp. 219-228
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
17
-
-
33748678899
-
Reliable broadcast in radio networks: The bounded collision case
-
C. Koo, V. Bhandari, J. Katz, and N. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In PODC, pages 258-264, 2006.
-
(2006)
PODC
, pp. 258-264
-
-
Koo, C.1
Bhandari, V.2
Katz, J.3
Vaidya, N.4
-
18
-
-
84859022001
-
-
Mcgraw Hill Higher Education; 3rd edition
-
J.-D. Kraus. Antennas. Mcgraw Hill Higher Education; 3rd edition, 2001.
-
(2001)
Antennas
-
-
Kraus, J.-D.1
-
19
-
-
78751527470
-
Defending dsss-based broadcast communication against insider jammers via delayed seed-disclosure
-
A. Liu, P. Ning, H. Dai, Y. Liu, and C. Wang. Defending dsss-based broadcast communication against insider jammers via delayed seed-disclosure. In Proceedings of ACSAC'2010, 2010.
-
(2010)
Proceedings of ACSAC'2010
-
-
Liu, A.1
Ning, P.2
Dai, H.3
Liu, Y.4
Wang, C.5
-
20
-
-
80051902256
-
Thwarting inside jamming attacks on wireless broadcast communications
-
S. Liu, L. Lazos, and M. Krunz. Thwarting inside jamming attacks on wireless broadcast communications. In In Proceedings of ACM WiSec, pages 29-40, 2011.
-
(2011)
Proceedings of ACM WiSec
, pp. 29-40
-
-
Liu, S.1
Lazos, L.2
Krunz, M.3
-
21
-
-
77953306472
-
Randomized differential dsss: Jamming-resistant wireless broadcast communication
-
Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: jamming-resistant wireless broadcast communication. In INFOCOM, pages 695-703, 2010.
-
(2010)
INFOCOM
, pp. 695-703
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
25
-
-
76749132821
-
Ares: An anti-jamming reinforcement system for 802.11 networks
-
K. Pelechrinis, S. V. Krishnamurthy, C. Gkantsidis, and I. Broustis. Ares: An anti-jamming reinforcement system for 802.11 networks. CoNEXT, pages 181-192, 2009.
-
(2009)
CoNEXT
, pp. 181-192
-
-
Pelechrinis, K.1
Krishnamurthy, S.V.2
Gkantsidis, C.3
Broustis, I.4
-
31
-
-
70349110082
-
A coding-theoretic approach for efficient message verification over insecure channels
-
D. Slater, P. Tague, R. Poovendran, and B. J. Matt. A coding-theoretic approach for efficient message verification over insecure channels. In Proceeding of ACM WiSec, 2009.
-
(2009)
Proceeding of ACM WiSec
-
-
Slater, D.1
Tague, P.2
Poovendran, R.3
Matt, B.J.4
-
37
-
-
84879509587
-
-
uPrint. Uprint plus. http://www.uprint3dprinting.com/.
-
Uprint Plus
-
-
-
40
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41-47, 2006.
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
41
-
-
35348897340
-
Channel surfing: Defending wireless sensor networks from interference
-
W. Xu, W. Trappe, and Y. Zhang. Channel surfing: defending wireless sensor networks from interference. In Proceedings of IPSN, 2007.
-
(2007)
Proceedings of IPSN
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
42
-
-
84155172323
-
A hierarchical ight planning framework for air trafic management
-
W. Zhang, M. Kamgarpour, D. Sun, and C. Tomlin. A hierarchical ight planning framework for air trafic management. Proceedings of the IEEE, 100(1), 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
-
-
Zhang, W.1
Kamgarpour, M.2
Sun, D.3
Tomlin, C.4
|