-
2
-
-
0000821797
-
A general distribution theory for a class of likelihood criteria
-
Dec.
-
G.E.P. Box, "A general distribution theory for a class of likelihood criteria," Biometrika, v. 36, pp. 317-246, Dec. 1949.
-
(1949)
Biometrika
, vol.36
, pp. 317-246
-
-
Box, G.E.P.1
-
4
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
D. Faria and D. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. 5th ACM Workshop Wireless Security (WiSe '06), pp. 43-52, Sept. 2006. (Pubitemid 46634301)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
6
-
-
55149090486
-
On comparing several spectral densities
-
Aug
-
K. Fokianos and A. Savvides, "On comparing several spectral densities," Technometrics, vol. 50, no. 3, pp. 317-331, Aug. 2008.
-
(2008)
Technometrics
, vol.50
, Issue.3
, pp. 317-331
-
-
Fokianos, K.1
Savvides, A.2
-
7
-
-
0016705681
-
The likelihood ratio criterion for a composite hypothesis under a local alternative
-
Aug
-
T. Hayakawa, "The likelihood ratio criterion for a composite hypothesis under a local alternative," Biometrika, vol. 62, no. 2, pp. 451-460, Aug. 1975.
-
(1975)
Biometrika
, vol.62
, Issue.2
, pp. 451-460
-
-
Hayakawa, T.1
-
8
-
-
0032343819
-
Discrimination and clustering for multivariate time series
-
Y. Kakizawa, R.H. Shumway and M. Taniguchi, "Discrimination and clustering for multivariate time series," J. Am. Stat. Assos., vol. 93, pp. 328-340, 1998.
-
(1998)
J. Am. Stat. Assos.
, vol.93
, pp. 328-340
-
-
Kakizawa, Y.1
Shumway, R.H.2
Taniguchi, M.3
-
9
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
DOI 10.1145/1161289.1161297, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
Z. Li, W. Xu, R. Miller and W. Trappe, "Securing wireless systems via lower layer enforcements," in Proc. 5th ACM Workshop Wireless Security (WiSe '06), pp. 33-42, Sept. 2006. (Pubitemid 46634300)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 33-42
-
-
Zang, L.1
Wenyuan, X.2
Miller, R.3
Trappe, W.4
-
10
-
-
65349170091
-
Testing equality of stationary autocovariances
-
R. Lund, H. Bassily and B. Vidakovic, "Testing equality of stationary autocovariances," J. Time Series Anal., vol. 30, pp. 332-348, 2009.
-
(2009)
J. Time Series Anal.
, vol.30
, pp. 332-348
-
-
Lund, R.1
Bassily, H.2
Vidakovic, B.3
-
11
-
-
0036980638
-
Your 802.11 network has no clothes
-
Dec
-
A. Mishra, M. Shin and W.A. Arbaugh, "Your 802.11 network has no clothes," IEEE Wireless Commun., vol. 9, No. 6, pp. 44-51, Dec. 2002.
-
(2002)
IEEE Wireless Commun.
, vol.9
, Issue.6
, pp. 44-51
-
-
Mishra, A.1
Shin, M.2
Arbaugh, W.A.3
-
13
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
Montreal, QC Sept 12
-
N. Patwari and S.K. Kasera, "Robust location distinction using temporal link signatures," in Proc. 13th Int. Conf. Mobile Computing and Networking (Mobicom-07), pp. 111-122, Montreal, QC, Sept 12, 2007.
-
(2007)
Proc. 13th Int. Conf. Mobile Computing and Networking (Mobicom-07)
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.K.2
-
14
-
-
78751632083
-
Temporal link signature measurements for location distinction
-
March
-
N. Patwari and S.K. Kasera, "Temporal link signature measurements for location distinction," IEEE Trans. Mobile Computing, vol. 10, pp. 449-462, March 2011.
-
(2011)
IEEE Trans. Mobile Computing
, vol.10
, pp. 449-462
-
-
Patwari, N.1
Kasera, S.K.2
-
17
-
-
77957303297
-
Spectrumbased comparison of stationary multivariate time series
-
N. Ravishankar, J.R.M. Hosking and J. Mukhopadhyay, "Spectrumbased comparison of stationary multivariate time series," Methodology and Computing in Applied Prob., vol. 12, pp. 749-762, 2010.
-
(2010)
Methodology and Computing in Applied Prob.
, vol.12
, pp. 749-762
-
-
Ravishankar, N.1
Hosking, J.R.M.2
Mukhopadhyay, J.3
-
18
-
-
31344448046
-
Wireless network security and interworking
-
Feb
-
M. Shin, J. Ma, A. Mishra and W.A. Arbaugh, "Wireless network security and interworking," Proc. IEEE, vol. 94, pp. 455-466, Feb. 2006.
-
(2006)
Proc. IEEE
, vol.94
, pp. 455-466
-
-
Shin, M.1
Ma, J.2
Mishra, A.3
Arbaugh, W.A.4
-
20
-
-
77953862278
-
On channel-based user authentication for mobile terminals
-
Pacific Grove, CA Nov. 1-4
-
J.K. Tugnait and H. Kim, "On channel-based user authentication for mobile terminals," in Proc. 43rd Asilomar Conf. Signals, Systems & Computers, pp. 967-971, Pacific Grove, CA, Nov. 1-4, 2009.
-
(2009)
Proc. 43rd Asilomar Conf. Signals, Systems & Computers
, pp. 967-971
-
-
Tugnait, J.K.1
Kim, H.2
-
22
-
-
79958009045
-
Wideband spectrum sensing for cognitive radios in unknown noise via power spectrum analysis
-
Pacific Grove, CA Nov. 7-10
-
J.K. Tugnait, "Wideband spectrum sensing for cognitive radios in unknown noise via power spectrum analysis," in Proc. 2010 44th Asilomar Conf. Signals, Systems & Computers, pp. 175-179, Pacific Grove, CA, Nov. 7-10, 2010.
-
(2010)
Proc. 2010 44th Asilomar Conf. Signals, Systems & Computers
, pp. 175-179
-
-
Tugnait, J.K.1
-
23
-
-
84858325067
-
On multiple antenna spectrum sensing under noise variance uncertainty and flat fading
-
April
-
J.K. Tugnait, "On multiple antenna spectrum sensing under noise variance uncertainty and flat fading," IEEE Trans. Signal Process., vol. 60, No. 4, pp. 1823-1832, April 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1823-1832
-
-
Tugnait, J.K.1
-
24
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
DOI 10.1109/ICC.2007.767, 4289438, 2007 IEEE International Conference on Communications, ICC'07
-
L. Xiao, L. Greenstein, N. Mandayam and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication," in Proc. IEEE Intern. Conf. Commun. (ICC), pp. 4646-4651, Glasgow, Scotland, June 2007. (Pubitemid 351146262)
-
(2007)
IEEE International Conference on Communications
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
25
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
July
-
L. Xiao, L.J. Greenstein, N.B. Mandayam and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, pp. 2571-2579, July 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
26
-
-
51849152971
-
MIMOassisted channel-based authentication in wireless networks
-
March 19-21, Princeton University, Princeton, NJ
-
L. Xiao, L.J. Greenstein, N.B. Mandayam and W. Trappe, "MIMOassisted channel-based authentication in wireless networks," in Proc. 42nd Annual Conf. on Information Sciences & Systems, pp. 642-646, March 19-21, 2008, Princeton University, Princeton, NJ.
-
(2008)
Proc. 42nd Annual Conf. on Information Sciences & Systems
, pp. 642-646
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
27
-
-
73049092718
-
Channelbased spoofing detection in frequency-selective Rayleigh channels
-
Dec
-
L. Xiao, L.J. Greenstein, N.B. Mandayam and W. Trappe, "Channelbased spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Commun., vol. 8, pp. 5948-5956, Dec. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, pp. 5948-5956
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
28
-
-
79551640226
-
PHY-Authentication protocol for spoofing detection in wireless networks
-
Miami, Fl Dec. 6-10
-
L. Xiao, A. Reznik, W. Trappe, C. Ye, Y. Shah, L. Greenstein and N. Mandayam, "PHY-Authentication protocol for spoofing detection in wireless networks," in Proc. IEEE Global Teleommun. Conf. (GLOBECOM), Miami, Fl, Dec. 6-10, 2010.
-
(2010)
Proc. IEEE Global Teleommun. Conf. (GLOBECOM)
-
-
Xiao, L.1
Reznik, A.2
Trappe, W.3
Ye, C.4
Shah, Y.5
Greenstein, L.6
Mandayam, N.7
-
29
-
-
70349675562
-
Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks
-
Brazil, April
-
J. Yang, Y. Chen, W. Trappe and J. Cheng, "Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks," in Proc. 28th IEEE Intern. Conf. Comp. Commun. (IEEE INFOCOM 2009), Brazil, April 2009.
-
(2009)
Proc. 28th IEEE Intern. Conf. Comp. Commun. (IEEE INFOCOM 2009)
-
-
Yang, J.1
Chen, Y.2
Trappe, W.3
Cheng, J.4
-
30
-
-
70449560388
-
Detecting spoofing attacks in mobile wireless environments
-
Rome, Italy, June
-
J. Yang, Y. Chen and W. Trappe, "Detecting spoofing attacks in mobile wireless environments," in Proc. Sixth Annual IEEE Commun. Society Conf. Sensor, Mesh, Ad Hoc Commun. Netw. (IEEE SECON 2009), Rome, Italy, June 2009.
-
(2009)
Proc. Sixth Annual IEEE Commun. Society Conf. Sensor, Mesh, Ad Hoc Commun. Netw. (IEEE SECON 2009)
-
-
Yang, J.1
Chen, Y.2
Trappe, W.3
-
31
-
-
77953297543
-
Exploiting multipleantenna diversity for shared secret key generation in wireless networks
-
San Deigo, CA, March 15-19
-
K. Zeng, D. Wu, A. Chan and P. Mohapatra, "Exploiting multipleantenna diversity for shared secret key generation in wireless networks," in Proc. IEEE INFOCOM 2010, San Deigo, CA, March 15-19, 2010.
-
(2010)
Proc. IEEE INFOCOM 2010
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
32
-
-
79960885766
-
Identity-based attack detection in mobile wireless networks
-
Shanghai, China, April 10-15
-
K. Zeng, K. Govindan, D. Wu and P. Mohapatra, "Identity-based attack detection in mobile wireless networks," in Proc. IEEE INFOCOMm 2011, Shanghai, China, April 10-15, 2011.
-
(2011)
Proc. IEEE INFOCOMm 2011
-
-
Zeng, K.1
Govindan, K.2
Wu, D.3
Mohapatra, P.4
-
33
-
-
27644537515
-
Time-variant channel estimation using discrete prolate spheroidal sequences
-
DOI 10.1109/TSP.2005.853104
-
T. Zemen and F. Mecklenbrauker, "Time-variant channel estimation using discrete prolate spheroidal sequences," IEEE Trans. Signal Processing, vol. 53, no. 9, pp. 3597-3607, Sept. 2005. (Pubitemid 41555643)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.9
, pp. 3597-3607
-
-
Zemen, T.1
Mecklenbrauker, C.F.2
-
34
-
-
0038044787
-
Simulation models with correct statistical properties for Rayleigh fading channels
-
June
-
Y.R. Zheng and C Xiao, "Simulation models with correct statistical properties for Rayleigh fading channels," IEEE Trans. Commun., vol. 51, pp. 920-928, June 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, pp. 920-928
-
-
Zheng, Y.R.1
Xiao, C.2
|