-
2
-
-
84899859912
-
A black hole attack model using topology approximation for reactive ad-hoc routing protocols
-
C. Badenhop and B. Mullins, A black hole attack model using topology approximation for reactive ad-hoc routing protocols, International Journal of Security and Networks, vol. 9(2), pp. 63–77, 2014.
-
(2014)
International Journal of Security and Networks
, vol.9
, Issue.2
, pp. 63-77
-
-
Badenhop, C.1
Mullins, B.2
-
3
-
-
84951874175
-
-
W. Boyes, All quiet on the wireless front, Control Global, Schaumburg, Illinois (www.controlglobal.com/articles/2011/all-quite-onthe-wireless-front), August 9, 2011.
-
-
-
Boyes, W.1
-
4
-
-
84951871178
-
-
in Critical Infrastructure Protection VII, J. Butts and S. Shenoi (Eds.), Springer, Heidelberg, Germany
-
C. Dubendorfer, B. Ramsey and M. Temple, ZigBee device verification for securing industrial control and building automation systems, in Critical Infrastructure Protection VII, J. Butts and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 47–62, 2013.
-
(2013)
Zigbee Device Verification for Securing Industrial Control and Building Automation Systems
, pp. 47-62
-
-
Dubendorfer, C.1
Ramsey, B.2
Temple, M.3
-
6
-
-
84951870065
-
-
1.1, Chandler, Arizona
-
Freescale Semiconductor, Freescale Beestack: Application Development Guide, Document Number: BSADG Rev. 1.1, Chandler, Arizona, 2008.
-
(2008)
Application Development Guide, Document Number: BSADG Rev
-
-
Semiconductor, F.1
Beestack, F.2
-
7
-
-
84951874177
-
-
InGuardians, Converting Radio Signals to Data Packets: Examination of Using GNU Radio Companion for Security Research and Assessment, Washington, DC (www.inguardians.com/pubs/GRC_signal_analysis_InGuardians_v1.pdf), 2014.
-
-
-
-
8
-
-
77953766580
-
Optimal jamming attack strategies and network defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos and R. Poovendran, Optimal jamming attack strategies and network defense policies in wireless sensor networks, IEEE Transactions on Mobile Computing, vol. 9(8), pp. 1119–1133, 2010.
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.8
, pp. 1119-1133
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
9
-
-
84884103108
-
Robust wireless infrastructure against jamming attacks
-
S. Das, K. Kant and N. Zhang (Eds.), Morgan Kaufmann, Waltham, Massachusetts
-
G. Noubir, Robust wireless infrastructure against jamming attacks, in Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, S. Das, K. Kant and N. Zhang (Eds.), Morgan Kaufmann, Waltham, Massachusetts, pp. 123–145, 2012.
-
(2012)
Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges
, pp. 123-145
-
-
Noubir, G.1
-
10
-
-
80051801375
-
Denial-of-service attacks on wireless networks: The case of the jammers
-
K. Pelechrinis, M. Iliofotou and S. Krishnamurthy, Denial-of-service attacks on wireless networks: The case of the jammers, IEEE Communications Surveys and Tutorials, vol. 13(2), pp. 245–257, 2011.
-
(2011)
IEEE Communications Surveys and Tutorials
, vol.13
, Issue.2
, pp. 245-257
-
-
Pelechrinis, K.1
Iliofotou, M.2
Krishnamurthy, S.3
-
12
-
-
84993936186
-
Defensive rekeying strategies for physical-layermonitored low-rate wireless personal area networks
-
in, J. Butts and S. Shenoi (Eds.), Springer, Heidelberg, Germany
-
B. Ramsey and B. Mullins, Defensive rekeying strategies for physical-layermonitored low-rate wireless personal area networks, in Critical Infrastructure Protection VII, J. Butts and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 63–79, 2013.
-
(2013)
Critical Infrastructure Protection VII
, pp. 63-79
-
-
Ramsey, B.1
Mullins, B.2
-
13
-
-
84897678206
-
Watching for weakness in wild WPANs
-
B. Ramsey, B. Mullins, R. Speers and K. Batterton, Watching for weakness in wild WPANs, Proceedings of the IEEE Military Communications Conference, pp. 1404–1409, 2013.
-
(2013)
Proceedings of the IEEE Military Communications Conference
, pp. 1404-1409
-
-
Ramsey, B.1
Mullins, B.2
Speers, R.3
Batterton, K.4
-
14
-
-
84922252655
-
Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers
-
B. Ramsey, T. Stubbs, B. Mullins, M. Temple and M. Buckner, Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers, International Journal of Critical Infrastructure Protection, vol. 8, pp. 27–39, 2015.
-
(2015)
International Journal of Critical Infrastructure Protection
, vol.8
, pp. 27-39
-
-
Ramsey, B.1
Stubbs, T.2
Mullins, B.3
Temple, M.4
Buckner, M.5
-
15
-
-
84870338599
-
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
-
B. Reaves and T. Morris, Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems, International Journal of Critical Infrastructure Protection, vol. 5(3-4), pp. 154–174, 2012.
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.3-4
, pp. 154-174
-
-
Reaves, B.1
Morris, T.2
-
17
-
-
84951874180
-
-
Sigma Designs, Fremont, California (z-wave.sigma designs.com/products
-
Sigma Designs, Z-Wave Products, Fremont, California (z-wave.sigma designs.com/products), 2015.
-
(2015)
Z-Wave Products
-
-
-
18
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
M. Strasser, B. Danev and S. Capkun, Detection of reactive jamming in sensor networks, ACM Transactions on Sensor Networks, vol. 7(2), article no. 16, 2010.
-
(2010)
ACM Transactions on Sensor Networks
, vol.7
, Issue.2
-
-
Strasser, M.1
Danev, B.2
Capkun, S.3
-
19
-
-
84951874181
-
-
Texas Instruments, 2.4 GHz IEEE 802.15.4/ZigBee-Ready RF transceiver, CC2420, SWRS041c, Dallas, Texas (www.ti.com/lit/ds/symlink/cc2420.pdf), 2014.
-
-
-
-
20
-
-
84951874182
-
-
Texas Instruments, Low-Power Sub-1 GHz RF Transceiver, CC1101, SWRS0611, Dallas, Texas (www.ti.com/lit/ds/symlink/cc1101.pdf), 2015.
-
-
-
-
21
-
-
78651398360
-
Uncovering spoken phrases in encrypted voice-over-IP conversations
-
C. Wright, L. Ballard, S. Coull, F. Monrose and G Masson, Uncovering spoken phrases in encrypted voice-over-IP conversations, ACM Transactions on Information and System Security, vol. 13(4), article no. 35, 2010.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.4
-
-
Wright, C.1
Ballard, L.2
Coull, S.3
Monrose, F.4
Masson, G.5
-
22
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang and T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Neworking and Computing, pp. 46–57, 2005.
-
(2005)
Proceedings of the Sixth ACM International Symposium on Mobile Ad Hoc Neworking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
23
-
-
84951874183
-
-
Document No. DSH10756, version 6, Fremont, California (media.digikey.com/pdf/Data%20Sheets/Zensys%20PDFs/ZM3102N.pdf)
-
Zensys, ZM3102N Z-Wave Module Datasheet, Document No. DSH10756, version 6, Fremont, California (media.digikey.com/pdf/Data%20Sheets/Zensys%20PDFs/ZM3102N.pdf), 2007.
-
(2007)
ZM3102N Z-Wave Module Datasheet
-
-
|