-
1
-
-
84876750865
-
Simulation and analysis of RTS/CTS DoS attack variants in 802. 11 networks
-
PMD Nagarjun, V. Anil Kumar, Ch Aswani Kumar, Ahkshaey Ravi "Simulation and Analysis of RTS/CTS DoS Attack Variants in 802. 11 Networks", IEEE Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22.
-
IEEE Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22
-
-
Nagarjun, P.1
Anil Kumar, V.2
Aswani Kumar, C.3
Ravi, A.4
-
2
-
-
84925368904
-
802. 11 Denial-of-Service attacks: Real vulnerabilities and practical solutions
-
Washington D. C., USA, Aug.
-
J. Bellardo and S. Savage, "802. 11 Denial-of-Service attacks: Real vulnerabilities and practical solutions," 12th USENIX Security Symposium, Washington D. C., USA, vol. 12, pp. 2-2, Aug. 2003.
-
(2003)
12th USENIX Security Symposium
, vol.12
, pp. 2-2
-
-
Bellardo, J.1
Savage, S.2
-
3
-
-
79955055383
-
Protecting wireless networks against a Denial of Service attack based on Virtual jamming
-
CA, USA, Sept., unpublished
-
Dazhi Chen, Jing Deng and K. Varshney Pramod, "Protecting wireless networks against a Denial of Service attack based on Virtual jamming," MobiCom 2003, CA, USA, Sept. 2003, unpublished.
-
(2003)
MobiCom 2003
-
-
Chen, D.1
Deng, J.2
Varshney Pramod, K.3
-
5
-
-
78149444755
-
Greedy receivers in IEEE 802. 11 Hotspots: Impacts and detection
-
Mi Kyung Han and Lili Qiu, "Greedy receivers in IEEE 802. 11 Hotspots: impacts and Detection," Dependable and Secure Computing,vol. 7, pp. 410-423, 2010.
-
(2010)
Dependable and Secure Computing
, vol.7
, pp. 410-423
-
-
Kyung Han, M.1
Qiu, L.2
-
9
-
-
84865731679
-
Flow level detection and filtering of low-rate DDoS
-
Changwang Zhang, Zhiping Cai, Weifeng Chen, Xiapu Luo and Jianping Yin "Flow level detection and filtering of low-rate DDoS", Computer Networks 56 (2012) 3417-3431.
-
(2012)
Computer Networks
, vol.56
, pp. 3417-3431
-
-
Zhang, C.1
Cai, Z.2
Chen, W.3
Luo, X.4
Yin, J.5
-
10
-
-
78649431870
-
A Cross-Layer scheme for solving hidden device problem in IEEE 802. 15. 4 wireless sensor networks
-
February
-
Hsueh-Wen Tseng, Shan-Chi Yang, Ping-Cheng Yeh, and Ai-Chun Pang "A Cross-Layer Scheme for Solving Hidden Device Problem in IEEE 802. 15. 4 Wireless Sensor Networks", IEEE Sensors Journal, Vol. 11, No. 2, February 2011.
-
(2011)
IEEE Sensors Journal
, vol.11
, Issue.2
-
-
Tseng, H.1
Yang, S.2
Yeh, P.3
Pang, A.4
-
11
-
-
84880142357
-
A unified analysis of IEEE 802. 11 DCF networks: Stability, throughput, and delay
-
August
-
Lin Dai and Xinghua Sun "A Unified Analysis Of IEEE 802. 11 DCF Networks: Stability, Throughput, And Delay", IEEE Transactions On Mobile Computing, Vol. 12, No. 8, August 2013.
-
(2013)
IEEE Transactions on Mobile Computing
, vol.12
, Issue.8
-
-
Dai, L.1
Sun, X.2
-
12
-
-
84880542851
-
Hidden-Node detection in IEEE 802. 11n wireless LANs
-
July
-
Minho Kim and Chong-Ho Choi "Hidden-Node Detection in IEEE 802. 11n Wireless LANs" IEEE Transactions On Vehicular Technology, Vol. 62, No. 6, July 2013.
-
(2013)
IEEE Transactions on Vehicular Technology
, vol.62
, Issue.6
-
-
Kim, M.1
Choi, C.2
|