-
1
-
-
84922223758
-
Industrial wireless: all quiet on the wireless front
-
Boyes W. Industrial wireless: all quiet on the wireless front. Control Glob. 2011.
-
(2011)
Control Glob.
-
-
Boyes, W.1
-
3
-
-
71049178173
-
Transient-based identification of wireless sensor nodes
-
in: Proceedings of the International Conference on Information Processing in Sensor Networks
-
B. Danev, S. Capkun, Transient-based identification of wireless sensor nodes, in: Proceedings of the International Conference on Information Processing in Sensor Networks, 2009, pp. 25-36.
-
(2009)
, pp. 25-36
-
-
Danev, B.1
Capkun, S.2
-
4
-
-
77952407534
-
Attacks on physical-layer identification
-
in: Proceedings of the Third ACM Conference on Wireless Network Security
-
B. Danev, H. Luechken, S. Capkun, K. El Defrawy, Attacks on physical-layer identification, in: Proceedings of the Third ACM Conference on Wireless Network Security, pp. 89-98, 2010.
-
(2010)
, pp. 89-98
-
-
Danev, B.1
Luechken, H.2
Capkun, S.3
El Defrawy, K.4
-
5
-
-
84874333373
-
An RF-DNA verification process for ZigBee networks
-
in: Proceedings of the Military Communications Conference
-
C. Dubendorfer, B. Ramsey, M. Temple, An RF-DNA verification process for ZigBee networks, in: Proceedings of the Military Communications Conference, 2012.
-
(2012)
-
-
Dubendorfer, C.1
Ramsey, B.2
Temple, M.3
-
6
-
-
0003922190
-
Pattern Classification
-
John Wiley and Sons
-
Duda R., Hart P., Stork D. Pattern Classification. New York 2001, John Wiley and Sons.
-
(2001)
New York
-
-
Duda, R.1
Hart, P.2
Stork, D.3
-
7
-
-
84907697431
-
Assessment of Demand Response and Advanced Metering
-
Staff Report, Washington, DC
-
Federal Energy Regulatory Commission, Assessment of Demand Response and Advanced Metering, Staff Report, Washington, DC , 2012. http://www.ferc.gov/legal/staff-reports/12-20-12-demand-response.pdf.
-
(2012)
-
-
-
8
-
-
84885894065
-
Extracting keys from second generation ZigBee chips
-
presented at Black Hat USA
-
T. Goodspeed, Extracting keys from second generation ZigBee chips, presented at Black Hat USA , 2009. http://www.blackhat.com/presentations/bhusa-09/GOODSPEED/BHUSA09-Goodspeed-ZigbeeChips-PAPER.pdf.
-
(2009)
-
-
Goodspeed, T.1
-
9
-
-
84863269702
-
Api-do: Tools for exploring the wireless attack surface in smart meters
-
in: Proceedings of the Forty-Fifth Hawaii International Conference on System Sciences
-
T. Goodspeed, S. Bratus, R. Melgares, R. Speers, S. Smith, Api-do: Tools for exploring the wireless attack surface in smart meters, in: Proceedings of the Forty-Fifth Hawaii International Conference on System Sciences, pp. 2133-2140, 2012.
-
(2012)
, pp. 2133-2140
-
-
Goodspeed, T.1
Bratus, S.2
Melgares, R.3
Speers, R.4
Smith, S.5
-
10
-
-
0003684449
-
-
Springer, New York
-
Hastie T., Tibshirani R., Friedman J. The Elements of Statistical Learning; Data Mining, Inference and Prediction 2009, Springer, New York.
-
(2009)
The Elements of Statistical Learning; Data Mining, Inference and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
11
-
-
84871987901
-
Identification of legacy radios in a cognitive radio network using a radio frequency fingerprinting based method
-
in: Proceedings of the IEEE International Conference on Communications
-
N. Hu, Y. Yao, Identification of legacy radios in a cognitive radio network using a radio frequency fingerprinting based method, in: Proceedings of the IEEE International Conference on Communications, pp. 1597-1602, 2012.
-
(2012)
, pp. 1597-1602
-
-
Hu, N.1
Yao, Y.2
-
12
-
-
10644233142
-
Guest Editorial, Introduction to the special section on M-Health: Beyond seamless mobility and global wireless healthcare connectivity
-
Istepanian R., Jovanov E., Zhang Y. Guest Editorial, Introduction to the special section on M-Health: Beyond seamless mobility and global wireless healthcare connectivity. IEEE Trans. Inf. Technol. Biomed. 2004, 8(4):405-414.
-
(2004)
IEEE Trans. Inf. Technol. Biomed.
, vol.8
, Issue.4
, pp. 405-414
-
-
Istepanian, R.1
Jovanov, E.2
Zhang, Y.3
-
13
-
-
84922211116
-
Waveform Collection for use in Wireless Telephone Identification
-
D. Kapan, D. Stanhope, Waveform Collection for use in Wireless Telephone Identification, U.S. Patent 5,999,806, December 7, 1999.
-
(1999)
U.S. Patent 5,999,806, December 7
-
-
Kapan, D.1
Stanhope, D.2
-
14
-
-
84874294621
-
Where's the mote? Ask the MoteHunter!
-
in: Proceedings of the Thirty-Seventh IEEE Conference on Local Computer Networks Workshops
-
C. Kiraly, G. Picco, Where's the mote? Ask the MoteHunter! in: Proceedings of the Thirty-Seventh IEEE Conference on Local Computer Networks Workshops, pp. 982-990, 2012.
-
(2012)
, pp. 982-990
-
-
Kiraly, C.1
Picco, G.2
-
15
-
-
84881382576
-
ZigBee-based internet of things in 3D terrains
-
Lin M., Leu J., Li K., Wu J. ZigBee-based internet of things in 3D terrains. Comput. Electr. Eng. 2013, 39(6):1667-1683.
-
(2013)
Comput. Electr. Eng.
, vol.39
, Issue.6
, pp. 1667-1683
-
-
Lin, M.1
Leu, J.2
Li, K.3
Wu, J.4
-
16
-
-
80051512509
-
Identifying wireless users via transmitter imperfections
-
Polak A., Dolatshahi S., Goeckel D. Identifying wireless users via transmitter imperfections. IEEE J. Sel. Areas Commun. 2011, 29(7):1469-1479.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.7
, pp. 1469-1479
-
-
Polak, A.1
Dolatshahi, S.2
Goeckel, D.3
-
17
-
-
84897678206
-
Watching for weakness in wild WPANs
-
in: Proceedings of the Military Communications Conference
-
B. Ramsey, B. Mullins, R. Speers, K. Batterton, Watching for weakness in wild WPANs, in: Proceedings of the Military Communications Conference, pp. 1401-1409, 2013.
-
(2013)
, pp. 1401-1409
-
-
Ramsey, B.1
Mullins, B.2
Speers, R.3
Batterton, K.4
-
18
-
-
84874344339
-
Improved tools for indoor ZigBee warwalking
-
in: Proceedings of the Thirty-Seventh IEEE Conference on Local Computer Networks Workshops
-
B. Ramsey, B. Mullins, E. White, Improved tools for indoor ZigBee warwalking, in: Proceedings of the Thirty-Seventh IEEE Conference on Local Computer Networks Workshops, pp. 921-924, 2012.
-
(2012)
, pp. 921-924
-
-
Ramsey, B.1
Mullins, B.2
White, E.3
-
19
-
-
84877659198
-
PHY foundation for multi-factor ZigBee node authentication
-
in: Proceedings of the IEEE Global Communications Conference
-
B. Ramsey, M. Temple, B. Mullins, PHY foundation for multi-factor ZigBee node authentication, in: Proceedings of the IEEE Global Communications Conference, pp. 795-800, 2012.
-
(2012)
, pp. 795-800
-
-
Ramsey, B.1
Temple, M.2
Mullins, B.3
-
20
-
-
79955712919
-
Key management systems for sensor networks in the context of the internet of things
-
Roman R., Alcaraz C., Lopez J., Sklavos N. Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 2011, 37(2):147-159.
-
(2011)
Comput. Electr. Eng.
, vol.37
, Issue.2
, pp. 147-159
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
Sklavos, N.4
-
21
-
-
84922234095
-
Air Force hospital eliminates equipment loss
-
reduces labor hours, RFID J.
-
C. Swedberg, Air Force hospital eliminates equipment loss, reduces labor hours, RFID J. (), 2011. http://www.rfidjournal.com/articles/view?8445.
-
(2011)
-
-
Swedberg, C.1
-
22
-
-
84871992823
-
Analysis of receiver front end on the performance of RF fingerprinting
-
in: Proceedings of the Twenty-Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications
-
S. Ur Rehman, K. Sowerby, C. Coghill, Analysis of receiver front end on the performance of RF fingerprinting, in: Proceedings of the Twenty-Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2494-2499, 2012.
-
(2012)
, pp. 2494-2499
-
-
Ur Rehman, S.1
Sowerby, K.2
Coghill, C.3
-
23
-
-
84891938032
-
Analysis of impersonation attacks on systems using RF fingerprints and low-end receivers
-
Ur Rehman S., Sowerby K., Coghil C. Analysis of impersonation attacks on systems using RF fingerprints and low-end receivers. J. Comput. Syst. Sci. 2014, 80(3):591-601.
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.3
, pp. 591-601
-
-
Ur Rehman, S.1
Sowerby, K.2
Coghil, C.3
-
24
-
-
84922235815
-
-
KillerBee: Framework and Tools for Exploiting ZigBee and IEEE 802.15.4 Networks. Version 1.0
-
J. Wright, KillerBee: Framework and Tools for Exploiting ZigBee and IEEE 802.15.4 Networks. Version 1.0. http://code.google.com/p/killerbee.
-
-
-
Wright, J.1
|