-
1
-
-
0036793924
-
Denial of service in sensor networks
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
2
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ser. MobiHoc '05, 2005, pp. 46-57.
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Ser. MobiHoc '05
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
3
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
M. Strasser, B. Danev, and S. Capkun, "Detection of reactive jamming in sensor networks," ACM Transactions on Sensor Networks(TOSN), vol. 7, no. 16, pp. 1-29, 2010.
-
(2010)
ACM Transactions on Sensor Networks(TOSN)
, vol.7
, Issue.16
, pp. 1-29
-
-
Strasser, M.1
Danev, B.2
Capkun, S.3
-
4
-
-
80051801375
-
Denial of service attacks in wireless networks: The case of jammers
-
K. Pelechrinis, M. Iliofotou, and S. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," Communications Surveys Tutorials, IEEE, vol. 13, no. 2, pp. 245-257, 2011.
-
(2011)
Communications Surveys Tutorials, IEEE
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.3
-
6
-
-
85180418432
-
A practical, targeted, and stealthy attack against wpa enterprise authentication
-
February
-
A. Cassola, W. Robertson, E. Kirda, and G. Noubir, "A practical, targeted, and stealthy attack against wpa enterprise authentication," in Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13), February 2013.
-
(2013)
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13)
-
-
Cassola, A.1
Robertson, W.2
Kirda, E.3
Noubir, G.4
-
7
-
-
44849093231
-
OFDM channel estimation with jammed pilot detector under narrowband jamming
-
M. Han, T. Yu, J. Kim, K. Kwak, S. Lee, S. Han, and D. Hong, "OFDM channel estimation with jammed pilot detector under narrowband jamming," IEEE Transactions on Vehicular Technology, vol. 57, no. 3, pp. 1934-1939, 2008.
-
(2008)
IEEE Transactions on Vehicular Technology
, vol.57
, Issue.3
, pp. 1934-1939
-
-
Han, M.1
Yu, T.2
Kim, J.3
Kwak, K.4
Lee, S.5
Han, S.6
Hong, D.7
-
8
-
-
80052148438
-
Efficient OFDM denial: Pilot jamming and pilot nulling
-
T. Clancy, "Efficient OFDM denial: Pilot jamming and pilot nulling," in Proc. of ICC, 2011.
-
(2011)
Proc. of ICC
-
-
Clancy, T.1
-
10
-
-
80053152170
-
Clearing the RF smog: Making 802.11 robust to cross-technology interference
-
August
-
S. Gollakota, F. Adib, D. Katabi, and S. Seshan, "Clearing the RF smog: Making 802.11 robust to cross-technology interference," in Proc. of SIGCOMM, August 2011.
-
(2011)
Proc. of SIGCOMM
-
-
Gollakota, S.1
Adib, F.2
Katabi, D.3
Seshan, S.4
-
12
-
-
84861602103
-
Bittrickle: Defending against broadband and highpower reactive jamming attacks
-
Y. Liu and P. Ning, "Bittrickle: Defending against broadband and highpower reactive jamming attacks," in Proc. of IEEE INFOCOM, 2012.
-
(2012)
Proc. of IEEE INFOCOM
-
-
Liu, Y.1
Ning, P.2
-
13
-
-
60149086999
-
In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?
-
September
-
H. Kim and K. G. Shin, "In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?" in Proc. of MobiCom, September 2008, pp. 14-25.
-
(2008)
Proc. of MobiCom
, pp. 14-25
-
-
Kim, H.1
Shin, K.G.2
-
14
-
-
77953486706
-
Experimental study of spectrum sensing based on energy detection and network cooperation
-
D. Cabric, A. Tkachenko, and R. W. Brodersen, "Experimental study of spectrum sensing based on energy detection and network cooperation," in Proceedings of the First International Workshop on Technology and Policy for Accessing Spectrum, ser. TAPAS '06, 2006.
-
(2006)
Proceedings of the First International Workshop on Technology and Policy for Accessing Spectrum, Ser. TAPAS '06
-
-
Cabric, D.1
Tkachenko, A.2
Brodersen, R.W.3
-
15
-
-
84904434733
-
Anti-jamming timing channels for wireless networks
-
W. Xu, W. Trappe, and Y. Zhang, "Anti-jamming timing channels for wireless networks," in Proc. of WiSec, 2008.
-
(2008)
Proc. of WiSec
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
17
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
May
-
Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in Proc. of IEEE S&P, May 2010.
-
(2010)
Proc. of IEEE S&P
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
18
-
-
70349147920
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
W. Xu, W. Trappe, and Y. Zhang, "Channel surfing and spatial retreats: Defenses against wireless denial of service," in Proc. of WiSe, 2004.
-
(2004)
Proc. of WiSe
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
19
-
-
66549100735
-
ZigZag decoding: Combating hidden terminals in wireless networks
-
August
-
S. Gollakota and D. Katabi, "ZigZag decoding: Combating hidden terminals in wireless networks," in Proc. of SIGCOMM, August 2008, pp. 159-170.
-
(2008)
Proc. of SIGCOMM
, pp. 159-170
-
-
Gollakota, S.1
Katabi, D.2
-
20
-
-
84863546460
-
Enabling realtime interference alignment: Promises and challenges
-
K. Miller, A. Sanne, K. Srinivasan, and S. Vishwanath, "Enabling realtime interference alignment: Promises and challenges," in Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, 2012, pp. 55-64.
-
(2012)
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 55-64
-
-
Miller, K.1
Sanne, A.2
Srinivasan, K.3
Vishwanath, S.4
-
21
-
-
84866598205
-
Rate adaptation for 802.11 multiuser MIMO networks
-
August
-
W.-L. Shen, Y.-C. Tung, K.-C. Lee, K. C.-J. Lin, S. Gollakota, D. Katabi, and M.-S. Chen, "Rate adaptation for 802.11 multiuser MIMO networks," in Proc. of MobiCom, August 2012.
-
(2012)
Proc. of MobiCom
-
-
Shen, W.-L.1
Tung, Y.-C.2
Lee, K.-C.3
Lin, K.C.-J.4
Gollakota, S.5
Katabi, D.6
Chen, M.-S.7
-
22
-
-
84904434736
-
-
Ettus research llc
-
"Ettus research llc," http://www.ettus.com/.
-
-
-
-
23
-
-
84879538680
-
Detection of reactive jamming in dsss-based wireless networks
-
D. Giustiniano, V. Lenders, J. B. Schmitt, M. Spuhler, and M. Wilhelm, "Detection of reactive jamming in dsss-based wireless networks," in Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ser. WiSec '13, 2013, pp. 43-48.
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, Ser. WiSec '13
, pp. 43-48
-
-
Giustiniano, D.1
Lenders, V.2
Schmitt, J.B.3
Spuhler, M.4
Wilhelm, M.5
-
25
-
-
80051912129
-
On the robustness of ieee802.11 rate adaptation algorithms against smart jamming
-
June
-
G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa, "On the robustness of ieee802.11 rate adaptation algorithms against smart jamming," in Proc. of WiSec, June 2011.
-
(2011)
Proc. of WiSec
-
-
Noubir, G.1
Rajaraman, R.2
Sheng, B.3
Thapa, B.4
-
26
-
-
84904434730
-
Counter-jamming using mixed mechanical and software interference cancellation
-
April
-
T. D. Vo-Huu, E.-O. Blass, and G. Noubir, "Counter-jamming using mixed mechanical and software interference cancellation," in Proc. of WiSec, April 2013.
-
(2013)
Proc. of WiSec
-
-
Vo-Huu, T.D.1
Blass, E.-O.2
Noubir, G.3
|