-
1
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the USENIX Security Symposium, 2003, pp. 15-28.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
2
-
-
33144479525
-
Scan: Self-organized networklayer security in mobile ad hoc networks
-
Selected Areas in Communications
-
H. Yang, J. Shu, X. Meng, and S. Lu, "Scan: self-organized networklayer security in mobile ad hoc networks," Selected Areas in Communications, IEEE Journal on, 2006.
-
(2006)
IEEE Journal on
-
-
Yang, H.1
Shu, J.2
Meng, X.3
Lu, S.4
-
4
-
-
0036980638
-
Your 80211 wireless network has no clothes
-
W. Arbaugh, N. Shankar, Y. Wan, and K. Zhang, "Your 80211 wireless network has no clothes," Wireless Communications, IEEE, vol. 9, no. 6, pp. 44-51, 2002.
-
(2002)
Wireless Communicationsftxt IEEE
, vol.9
, Issue.6
, pp. 44-51
-
-
Arbaugh, W.1
Shankar, N.2
Wan, Y.3
Zhang, K.4
-
6
-
-
84861639032
-
A formal analysis of IEEE 802.11w deadlock vulnerabilities
-
M. Eian and S. F.Mjolsnes, "A formal analysis of ieee 802.11w deadlock vulnerabilities," in IEEE INFOCOM'12.
-
IEEE INFOCOM'12
-
-
Eian, M.1
Mjolsnes, S.2
-
7
-
-
51349133236
-
Detecting 802.11 mac layer spoofing using received signal strength
-
Y. Sheng, K. Tan, and et al., "Detecting 802.11 mac layer spoofing using received signal strength," in IEEE INFOCOM'08.
-
IEEE INFOCOM'08
-
-
Sheng, Y.1
Tan, K.2
-
8
-
-
84883106354
-
A new mac address spoofing detection algorithm using plcp header
-
P. Chumchu, T. Saelim, and C. Sriklauy, "A new mac address spoofing detection algorithm using plcp header," in IEEE ICOIN'11.
-
IEEE ICOIN'11
-
-
Chumchu, P.1
Saelim, T.2
Sriklauy, C.3
-
10
-
-
84883077677
-
Locating sensors in the forest: A case study in greenorbs
-
C. Bo and Z. e. a. Jiang, "Locating sensors in the forest: A case study in greenorbs," in IEEE INFOCOM'12.
-
IEEE INFOCOM'12
-
-
Bo, C.1
Jiang, Z.E.A.2
-
11
-
-
78650923253
-
Locating sensors in the wild: Pursuit of ranging quality
-
ACM
-
W. Xi, Y. He, Y. Liu, J. Zhao, L. Mo, Z. Yang, J. Wang, and X. Li, "Locating sensors in the wild: pursuit of ranging quality," in Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems. ACM, 2010, pp. 295-308.
-
(2010)
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
, pp. 295-308
-
-
Xi, W.1
He, Y.2
Liu, Y.3
Zhao, J.4
Mo, L.5
Yang, Z.6
Wang, J.7
Li, X.8
-
12
-
-
77952154160
-
Location, localization, and localizability
-
Y. Liu, Z. Yang, X. Wang, and L. Jian, "Location, localization, and localizability," Journal of Computer Science and Technology, vol. 25, no. 2, pp. 274-297, 2010.
-
(2010)
Journal of Computer Science and Technology
, vol.25
, Issue.2
, pp. 274-297
-
-
Liu, Y.1
Yang, Z.2
Wang, X.3
Jian, L.4
-
13
-
-
84861645934
-
Will: Wireless indoor localization without site survey
-
C. Wu, Z. Yang, Y. Liu, and W. Xi, "Will: Wireless indoor localization without site survey," IEEE Transactions on Parallel and Distributed Systems, 2012.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
-
-
Wu, C.1
Yang, Z.2
Liu, Y.3
Xi, W.4
-
14
-
-
84883061710
-
Security analysis and improvements for IEEE 802.11 i
-
C. Mitchell, "Security analysis and improvements for ieee 802.11 i," in (NDSS'05).
-
(NDSS'05)
-
-
Mitchell, C.1
-
15
-
-
33748995703
-
Detecting impersonation attacks in future wireless and mobile networks
-
M. Barbeau, J. Hall, and E. Kranakis, "Detecting impersonation attacks in future wireless and mobile networks," Secure Mobile Ad-hoc Networks and Sensors, pp. 80-95, 2006.
-
(2006)
Secure Mobile Ad-hoc Networks and Sensors
, pp. 80-95
-
-
Barbeau, M.1
Hall, J.2
Kranakis, E.3
-
17
-
-
48049094399
-
Detecting and localizing wireless spoofing attacks
-
IEEE
-
Y. Chen, W. Trappe, and R. Martin, "Detecting and localizing wireless spoofing attacks," in Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON'07. 4th Annual IEEE Communications Society Conference on. IEEE, 2007, pp. 193-202.
-
(2007)
Sensor, Mesh and Ad Hoc Communications and Networks 2007. SECON'07. 4th Annual IEEE Communications Society Conference on
, pp. 193-202
-
-
Chen, Y.1
Trappe, W.2
Martin, R.3
-
18
-
-
70349675562
-
Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks
-
J. Yang, Y. Chen, W. Trappe, and J. Cheng, "Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks," in IEEE INFOCOM'09.
-
IEEE INFOCOM'09
-
-
Yang, J.1
Chen, Y.2
Trappe, W.3
Cheng, J.4
-
20
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
N. Patwari and S. Kasera, "Robust location distinction using temporal link signatures," in ACM Mobicom'07.
-
ACM Mobicom'07
-
-
Patwari, N.1
Kasera, S.2
-
23
-
-
84861584706
-
Fila: Fine-grained indoor localization
-
IEEE
-
K. Wu, J. Xiao, Y. Yi, M. Gao, and L. Ni, "Fila: Fine-grained indoor localization," in INFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp. 2210-2218.
-
(2012)
INFOCOM, 2012 Proceedings IEEE
, pp. 2210-2218
-
-
Wu, K.1
Xiao, J.2
Yi, Y.3
Gao, M.4
Ni, L.5
-
25
-
-
84861598237
-
Enhanced wireless channel authentication using time-synched link signature
-
Y. Liu and P. Ning, "Enhanced wireless channel authentication using time-synched link signature," in IEEE INFOCOM'12.
-
IEEE INFOCOM'12
-
-
Liu, Y.1
Ning, P.2
-
27
-
-
60849100947
-
-
IEEE 802.11 n Working Group and others
-
IEEE 802.11 n Working Group and others, IEEE Standard 802.11n.
-
IEEE Standard 802.11n
-
-
-
29
-
-
0034832620
-
Outlier detection for high dimensional data
-
C. Aggarwal and P. Yu, "Outlier detection for high dimensional data," ACM Sigmod Record, 2001.
-
(2001)
ACM Sigmod Record
-
-
Aggarwal, C.1
Yu, P.2
|