-
2
-
-
84921889780
-
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
-
September
-
Bicacki K, Tavli B. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards and Interfaces (Elsevier) September 2008; 2009: 931-941.
-
(2008)
Computer Standards and Interfaces (Elsevier)
, vol.2009
, pp. 931-941
-
-
Bicacki, K.1
Tavli, B.2
-
3
-
-
47949091481
-
Jamming vulnerabilities of IEEE 802.11e
-
Thuente D, Newlin B, Acharya M. Jamming vulnerabilities of IEEE 802.11e. In Proceedings of MILCOM 2007, IEEE, Orlando, USA, October 2007; 1-7.
-
Proceedings of MILCOM 2007, IEEE, Orlando, USA, October 2007
, pp. 1-7
-
-
Thuente, D.1
Newlin, B.2
Acharya, M.3
-
4
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
May
-
Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: attack and defense strategies. IEEE Network May 2006; 20: 41-47.
-
(2006)
IEEE Network
, vol.20
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
5
-
-
33847392537
-
Effect of pulse jamming on IEEE 802.11 wireless LAN performance
-
Hall M, Silvennoinen A, Haggman S. Effect of pulse jamming on IEEE 802.11 wireless LAN performance. In Proceedings of MILCOM 2005, IEEE, Atlantic City, USA, October 2005; 2301-2306.
-
Proceedings of MILCOM 2005, IEEE, Atlantic City, USA, October 2005
, pp. 2301-2306
-
-
Hall, M.1
Silvennoinen, A.2
Haggman, S.3
-
6
-
-
67349201061
-
Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments
-
Cardenas A, Radosavac S, Baras J. Evaluation of detection algorithms for mac layer misbehavior: theory and experiments. IEEE/ACM Transactions on Networking 2009; 17: 605-617.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, pp. 605-617
-
-
Cardenas, A.1
Radosavac, S.2
Baras, J.3
-
8
-
-
0004209735
-
-
Princeton University Press: Princeton, New Jersey, USA
-
Shafer G. A Mathematical Theory of Evidence. Princeton University Press: Princeton, New Jersey, USA, 1976.
-
(1976)
A Mathematical Theory of Evidence
-
-
Shafer, G.1
-
9
-
-
33748965525
-
MOJO: A distributed physical layer anomaly detection system for 802.11 WLANs
-
Upsala, Sweden
-
Sheth A, Doerr C, Grunwald D, Han R, Sicker D. MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. In ACM MobiSys, Upsala, Sweden, 2006; 191-204.
-
(2006)
ACM MobiSys
, pp. 191-204
-
-
Sheth, A.1
Doerr, C.2
Grunwald, D.3
Han, R.4
Sicker, D.5
-
10
-
-
34547353508
-
A wireless distributed intrusion detection system and a new attack model
-
Aime M, Callandriello G, Lioy A. A wireless distributed intrusion detection system and a new attack model. In IEEE Symposium on Computers and Communications, Cagliari, Italy, 2006; 35-40.
-
IEEE Symposium on Computers and Communications, Cagliari, Italy, 2006
, pp. 35-40
-
-
Aime, M.1
Callandriello, G.2
Lioy, A.3
-
12
-
-
45749134626
-
Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks
-
Wood A, Stankovic J, Zhou G. Deejam: defeating energy-efficient jamming in ieee 802.15.4-based wireless networks. In Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, USA, June 2007; 60-69.
-
Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, USA, June 2007
, pp. 60-69
-
-
Wood, A.1
Stankovic, J.2
Zhou, G.3
-
13
-
-
33646423315
-
Application of anomaly detection algorithms for detecting syn flooding attacks
-
Siris V, Papagalou F. Application of anomaly detection algorithms for detecting syn flooding attacks. Computer Communications 2006; 29(9): 1433-1442.
-
(2006)
Computer Communications
, vol.29
, Issue.9
, pp. 1433-1442
-
-
Siris, V.1
Papagalou, F.2
-
14
-
-
35348828484
-
Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks
-
Cabrera J, Gutierez C, Mehra R. Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks. Information Fusion (Elsevier) 2008; 9(1): 96-119.
-
(2008)
Information Fusion (Elsevier)
, vol.9
, Issue.1
, pp. 96-119
-
-
Cabrera, J.1
Gutierez, C.2
Mehra, R.3
-
16
-
-
84925338777
-
Distributed change-point detection of DDoS attacks: Experimental results on deter testbed
-
Chen Y, Hwang K, Ku W. Distributed change-point detection of DDoS attacks: experimental results on deter testbed. In Proceedings of USENIX Security Symposium, Boston, USA, August 2007; 1-7.
-
Proceedings of USENIX Security Symposium, Boston, USA, August 2007
, pp. 1-7
-
-
Chen, Y.1
Hwang, K.2
Ku, W.3
-
17
-
-
47049121757
-
Data fusion algorithms for network anomaly detection: Classification and evaluation
-
IEEE Computer Society: Washington, DC, USA
-
Chatzigiannakis V, Androulidakis G, Pelechrinis K, Papavassiliou S, Maglaris V. Data fusion algorithms for network anomaly detection: classification and evaluation. In ICNS '07: Proceedings of the Third International Conference on Networking and Services. IEEE Computer Society:Washington, DC, USA, 2007; 1-7.
-
(2007)
ICNS '07: Proceedings of the Third International Conference on Networking and Services
, pp. 1-7
-
-
Chatzigiannakis, V.1
Androulidakis, G.2
Pelechrinis, K.3
Papavassiliou, S.4
Maglaris, V.5
-
18
-
-
83755196681
-
An on-line wireless attack detection system using multi-layer data fusion
-
Aparicio F, Kyriakopoulos K, Parish D. An on-line wireless attack detection system using multi-layer data fusion, In IEEE International Workshop on Measurements and Networking Proceedings, Anacapri, Italy, 2011; 1-5.
-
IEEE International Workshop on Measurements and Networking Proceedings, Anacapri, Italy, 2011
, pp. 1-5
-
-
Aparicio, F.1
Kyriakopoulos, K.2
Parish, D.3
-
20
-
-
78049486291
-
Anomaly detection using the Dempster-Shafer method
-
Chen Q, Aickelin U. Anomaly detection using the Dempster-Shafer method, In Proceedings of the 2006 International Conference on Data Mining, DMIN 2006, Las Vegas, USA, 2006; 232-240.
-
Proceedings of the 2006 International Conference on Data Mining, DMIN 2006, Las Vegas, USA, 2006
, pp. 232-240
-
-
Chen, Q.1
Aickelin, U.2
-
21
-
-
70349504836
-
Outlier detection in ad hoc networks using Dempster-Shafer theory
-
IEEE Computer Society: Washington, DC, USA
-
Li W, Joshi A. Outlier detection in ad hoc networks using Dempster-Shafer theory. In MDM '09: Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware. IEEE Computer Society: Washington, DC, USA, 2009; 112-121.
-
(2009)
MDM '09: Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
, pp. 112-121
-
-
Li, W.1
Joshi, A.2
-
22
-
-
67349127851
-
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
-
ACM: New York, NY, USA
-
Yu D, Frincke D. Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. In ACM-SE 43: Proceedings of the 43rd Annual Southeast Regional Conference. ACM: New York, NY, USA, 2005; 142-147.
-
(2005)
ACM-SE 43: Proceedings of the 43rd Annual Southeast Regional Conference
, pp. 142-147
-
-
Yu, D.1
Frincke, D.2
-
23
-
-
77956607840
-
Jamming detection mechanisms for wireless sensor networks
-
Cakiroglou M, Ozcerit T. Jamming detection mechanisms for wireless sensor networks. In Proceedings of 3rd International Conference on Scalable Information Systems, Napoli, Italy, June 2008; 1-8.
-
Proceedings of 3rd International Conference on Scalable Information Systems, Napoli, Italy, June 2008
, pp. 1-8
-
-
Cakiroglou, M.1
Ozcerit, T.2
-
24
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
Bhuse V, Gupta A. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 2006; 15: 33-51.
-
(2006)
Journal of High Speed Networks
, vol.15
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
25
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of ACM MobiHoc, Urbana, USA, May 2005; 46-57.
-
Proceedings of ACM MobiHoc, Urbana, USA, May 2005
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
26
-
-
35148872165
-
A cross-layer approach to detect jamming attacks in wireless ad hoc networks
-
Thamilarasu M, Mishra S, Sridhar R. A cross-layer approach to detect jamming attacks in wireless ad hoc networks. In Proceedings of MILCOM 2006, Washington DC, USA, October 2006; 1-7.
-
Proceedings of MILCOM 2006, Washington DC, USA, October 2006
, pp. 1-7
-
-
Thamilarasu, M.1
Mishra, S.2
Sridhar, R.3
-
27
-
-
76749132821
-
Ares: An anti-jamming reinforcement system for 802.11 networks
-
Pelechrinis K, Broustis I, Krishnamurthy S, Gkantsidis C. Ares: an anti-jamming reinforcement system for 802.11 networks. In Proceedings of CoNext 2009, Rome, Italy, 2009; 181-192.
-
Proceedings of CoNext 2009, Rome, Italy, 2009
, pp. 181-192
-
-
Pelechrinis, K.1
Broustis, I.2
Krishnamurthy, S.3
Gkantsidis, C.4
-
30
-
-
40949158575
-
Multi-channel jamming attacks using cognitive radios
-
Sampath A, Dai H, Zheng H, Zhao B. Multi-channel jamming attacks using cognitive radios. In Proceedings of ICCCN 2007, Honolulu, USA, 2007; 352-357.
-
Proceedings of ICCCN 2007, Honolulu, USA, 2007
, pp. 352-357
-
-
Sampath, A.1
Dai, H.2
Zheng, H.3
Zhao, B.4
-
32
-
-
84921891542
-
Cusum based distributed detection in wsns
-
Nadgir M, Premkumar K, Kumar A, Kuri J. Cusum based distributed detection in wsns. In MCDES 2008, Bangalore, India, 2008; 1-8.
-
(2008)
MCDES 2008, Bangalore, India
, pp. 1-8
-
-
Nadgir, M.1
Premkumar, K.2
Kumar, A.3
Kuri, J.4
-
33
-
-
85084096599
-
Catching instant messaging worms with change-point detection techniques
-
Yan G, Xiao Z, Eidenbenz S. Catching instant messaging worms with change-point detection techniques, In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, USA, April 2008; 1-10.
-
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, USA, April 2008
, pp. 1-10
-
-
Yan, G.1
Xiao, Z.2
Eidenbenz, S.3
-
34
-
-
42749085766
-
Adaptive threshold computation for cusum-type procedures in change detection and isolation problems. Elsevier
-
Verdier G, Hilgert N, Vila J. Adaptive threshold computation for cusum-type procedures in change detection and isolation problems. Elsevier, Computational Statistics and Data Analysis 2008; 52: 4161-4174.
-
(2008)
Computational Statistics and Data Analysis
, vol.52
, pp. 4161-4174
-
-
Verdier, G.1
Hilgert, N.2
Vila, J.3
-
35
-
-
35549011836
-
Robust and efficient detection of DDoS attacks for largescale internet
-
Lu K, Wu D, Fan J, Todorovic S, Nucci A. Robust and efficient detection of DDoS attacks for largescale internet. Computer Networks 2007; 51(18): 5036-5056.
-
(2007)
Computer Networks
, vol.51
, Issue.18
, pp. 5036-5056
-
-
Lu, K.1
Wu, D.2
Fan, J.3
Todorovic, S.4
Nucci, A.5
-
37
-
-
51349133236
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
IEEE: Phoenix, USA
-
Sheng Y, Tan K, Chen G, Kotz D, Campbell A. Detecting 802.11 MAC layer spoofing using received signal strength. In Proceedings of INFOCOM'08. IEEE: Phoenix, USA, 2008; 1768-1776.
-
(2008)
Proceedings of INFOCOM'08
, pp. 1768-1776
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
38
-
-
0023311178
-
On the Dempster-Shafer framework and new combination rules
-
Yager R. On the Dempster-Shafer framework and new combination rules. Information Sciences 1987; 41: 93-137.
-
(1987)
Information Sciences
, vol.41
, pp. 93-137
-
-
Yager, R.1
|