-
1
-
-
84871980595
-
-
[Online] Available:
-
Drive-thru Internet. [Online]. Available: http://www.drive-thru-Internet. org/
-
Drive-thru Internet
-
-
-
2
-
-
33751055575
-
A measurement study of vehicular internet access using in situ Wi-Fi networks
-
Los Angeles, CA, USA, Sep.
-
V. Bychkovsky, B. Hull, A. K. Miu, H. Balakrishnan, and S. Madden, "A measurement study of vehicular internet access using in situ Wi-Fi networks," in Proc. 12th ACM MOBICOM Conf., Los Angeles, CA, USA, Sep. 2006, pp. 50-61.
-
(2006)
Proc. 12th ACM MOBICOM Conf.
, pp. 50-61
-
-
Bychkovsky, V.1
Hull, B.2
Miu, A.K.3
Balakrishnan, H.4
Madden, S.5
-
3
-
-
8344283536
-
Drive-thru internet: IEEE 802.11b for 'automobile' users
-
J. Ott and D. Kutscher, "Drive-thru internet: IEEE 802.11b for 'automobile' users," in Proc. IEEE INFOCOM, 2004, pp. 362-373.
-
(2004)
Proc. IEEE INFOCOM
, pp. 362-373
-
-
Ott, J.1
Kutscher, D.2
-
4
-
-
84908146456
-
-
[Online] Available
-
Google Mountain View. [Online]. Available: http://wifi.google.com
-
Google Mountain View
-
-
-
5
-
-
70349670943
-
A measurement based rogue AP detection scheme
-
Brazil
-
H. Han, B. Sheng, C. Tan, Q. Li, and S. Lu, "A measurement based rogue AP detection scheme," in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, 2009, pp. 1593-1601.
-
(2009)
Proc IEEE INFOCOM, Rio de Janeiro
, pp. 1593-1601
-
-
Han, H.1
Sheng, B.2
Tan, C.3
Li, Q.4
Lu, S.5
-
6
-
-
80053563907
-
A timing-based scheme for rogue AP detection, IEEE
-
Nov.
-
H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011.
-
(2011)
Trans. Parallel Distrib. Syst.
, vol.22
, Issue.11
, pp. 1912-1925
-
-
Han, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
Lu, S.5
-
7
-
-
51349162676
-
A hybrid rogue access point protection framework for commodity Wi-Fi networks
-
L. Ma, A. Y. Teymorian, and X. Cheng, "A hybrid rogue access point protection framework for commodity Wi-Fi networks," in Proc. INFOCOM, 2008, pp. 1894-1902.
-
(2008)
Proc. INFOCOM
, pp. 1894-1902
-
-
Ma, L.1
Teymorian, A.Y.2
Cheng, X.3
-
8
-
-
42149159995
-
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
-
W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley, "Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs," in Proc. IMC, 2007, pp. 365-378.
-
(2007)
Proc. IMC
, pp. 365-378
-
-
Wei, W.1
Suh, K.2
Wang, B.3
Gu, Y.4
Kurose, J.5
Towsley, D.6
-
9
-
-
84885892757
-
Rogue access point detection using innate characteristics of the 802.11 MAC
-
A. Venkataraman and R. Beyah, "Rogue access point detection using innate characteristics of the 802.11 MAC," in Proc. SecureComm, 2009, pp. 394-416.
-
(2009)
Proc. SecureComm
, pp. 394-416
-
-
Venkataraman, A.1
Beyah, R.2
-
10
-
-
51249109756
-
Detecting protected layer-3 rogue APs
-
H. Yin, G. Chen, and J. Wang, "Detecting protected layer-3 rogue APs," in Proc. BROADNETS, 2007, pp. 449-458.
-
(2007)
Proc. BROADNETS
, pp. 449-458
-
-
Yin, H.1
Chen, G.2
Wang, J.3
-
11
-
-
11244291937
-
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
-
A. Adya, P. Bahl, R. Chandra, and L. Qiu, "Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks," in Proc. MOBICOM, 2004, pp. 30-44.
-
(2004)
Proc. MOBICOM
, pp. 30-44
-
-
Adya, A.1
Bahl, P.2
Chandra, R.3
Qiu, L.4
-
12
-
-
39349101259
-
A passive approach to rogue access point detection
-
L.Watkins, R. Beyah, and C. Corbett, "A passive approach to rogue access point detection," in Proc. IEEE GLOBECOM, 2007, pp. 355-360.
-
(2007)
Proc IEEE GLOBECOM
, pp. 355-360
-
-
Watkins, L.1
Beyah, R.2
Corbett, C.3
-
13
-
-
18144401989
-
Rogue access point detection using temporal traffic characteristics
-
R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in Proc. GLOBECOM, 2004, pp. 2271-2275.
-
(2004)
Proc. GLOBECOM
, pp. 2271-2275
-
-
Beyah, R.1
Kangude, S.2
Yu, G.3
Strickland, B.4
Copeland, J.5
-
14
-
-
33748979867
-
Enhancing the security of corporate Wi-Fi networks using DAIR
-
P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill, "Enhancing the security of corporate Wi-Fi networks using DAIR," in Proc. MobiSys, 2006, pp. 1-14.
-
(2006)
Proc. MobiSys
, pp. 1-14
-
-
Bahl, P.1
Chandra, R.2
Padhye, J.3
Ravindranath, L.4
Singh, M.5
Wolman, A.6
Zill, B.7
-
15
-
-
47949122729
-
Rogue access point detection by analyzing network traffic characteristics
-
S. Shetty, M. Song, and L. Ma, "Rogue access point detection by analyzing network traffic characteristics," in Proc. IEEEMILCOM, 2007, pp. 1-7.
-
(2007)
Proc. IEEEMILCOM
, pp. 1-7
-
-
Shetty, S.1
Song, M.2
Ma, L.3
-
16
-
-
57349195538
-
Supporting vehicular mobility in urban multi-hop wireless networks
-
A. Giannoulis, M. Fiore, and E. W. Knightly, "Supporting vehicular mobility in urban multi-hop wireless networks," in Proc. MobiSys, 2008, pp. 54-66.
-
(2008)
Proc. MobiSys
, pp. 54-66
-
-
Giannoulis, A.1
Fiore, M.2
Knightly, E.W.3
-
17
-
-
70349711763
-
-
[Online]. Available
-
Air defence. [Online]. Available: http://www.airdefense.net
-
Air Defence
-
-
-
18
-
-
60349083720
-
On fast and accurate detection of unauthorized wireless access points using clock skews
-
S. Jana and S. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," in Proc. MOBICOM, 2008, pp. 104-115.
-
(2008)
Proc. MOBICOM
, pp. 104-115
-
-
Jana, S.1
Kasera, S.2
-
19
-
-
51349133236
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
Y. Sheng, K. Tan, G. Chen, and D. Kotz, "Detecting 802.11 MAC layer spoofing using received signal strength," in Proc. IEEE INFOCOM, 2008, pp. 2441-2449.
-
(2008)
Proc IEEE INFOCOM
, pp. 2441-2449
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
-
20
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proc. MOBICOM, 2008, pp. 116-127.
-
(2008)
Proc. MOBICOM
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
21
-
-
84887958680
-
Novel packet sizebased covert channel attacks against anonymizer
-
Dec.
-
Z. Ling, X. Fu, W. Jia, W. Yu, D. Xuan, and J. Luo, "Novel packet sizebased covert channel attacks against anonymizer," IEEE Trans. Comput., vol. 62, no. 12, pp. 2411-2426, Dec. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.12
, pp. 2411-2426
-
-
Ling, Z.1
Fu, X.2
Jia, W.3
Yu, W.4
Xuan, D.5
Luo, J.6
-
22
-
-
36348987115
-
Softmac-Flexible wireless research platform
-
M. Neufeld, J. Fifield, C. Doerr, A. Sheth, and D. Grunwald, "Softmac-Flexible wireless research platform," in Proc. HotNets-IV, 2005, pp. 1-5.
-
(2005)
Proc. Hot Nets-IV
, pp. 1-5
-
-
Neufeld, M.1
Fifield, J.2
Doerr, C.3
Sheth, A.4
Grunwald, D.5
-
23
-
-
78649291578
-
Indoor localization without the pain
-
K. Chintalapudi, A. Padmanabha Iyer, and V. N. Padmanabhan, "Indoor localization without the pain," in Proc. 16th Annu. Int. Conf. Mobile Comput. Netw. MobiCom, 2010, pp. 173-184.
-
(2010)
Proc. 16th Annu. Int. Conf. Mobile Comput. Netw. MobiCom
, pp. 173-184
-
-
Chintalapudi, K.1
Padmanabha Iyer, A.2
Padmanabhan, V.N.3
-
24
-
-
80052807722
-
Characterizing WIFI link performance in open outdoor networks
-
U. Paul, R. Crepaldi, J. Lee, S.-J. Lee, and R. H. Etkin, "Characterizing WIFI link performance in open outdoor networks," in Proc. SECON, 2011, pp. 251-259.
-
(2011)
Proc. SECON
, pp. 251-259
-
-
Paul, U.1
Crepaldi, R.2
Lee, J.3
Lee, S.-J.4
Etkin, R.H.5
-
25
-
-
84887894775
-
Defending against vehicular rogue APs
-
H. Han, F. Xu, C. C. Tan, Y. Zhang, and Q. Li, "Defending against vehicular rogue APs," in Proc. IEEE INFOCOM, 2011, pp. 1665-1673.
-
(2011)
Proc IEEE INFOCOM
, pp. 1665-1673
-
-
Han, H.1
Xu, F.2
Tan, C.C.3
Zhang, Y.4
Li, Q.5
-
26
-
-
84908132834
-
-
[Online]. Available
-
Deliberant CPE 2-12. [Online]. Available: http://www.streakwave.com/mmSWAVE1/Video/CPE%202-12.pdf
-
Deliberant CPE
, pp. 2-12
-
-
-
27
-
-
84908132833
-
-
Openwrt. [Online]. Available
-
Openwrt. [Online]. Available: https://openwrt.org/
-
-
-
|