-
1
-
-
84962387684
-
-
Cisco, San Jose, CA, USA
-
K. Bode, Wireless traffic to reach 11. 2 exabytes a month, Cisco, San Jose, CA, USA, 2013. [Online]. Available: http://www.dslreports.com/shownews/Cisco-Wireless-Traffic-to-Reach-112-Exabytes-a-Month-By-2017-123040
-
(2013)
Wireless Traffic to Reach 11. 2 Exabytes A Month
-
-
Bode, K.1
-
2
-
-
84962387686
-
-
IEEE Standard for Information Technology, Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Std. 802.11-1997
-
IEEE Standard for Information Technology, Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 802. 11-1997, 1997. [Online]. Available: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=654749
-
(1997)
-
-
-
3
-
-
84938764738
-
Design and implementation of high-speed brute forcer for wpa/wpa2-psk [j]
-
L. Yong-lei, J. Zhi-gang, C. Zhe, and L. Jing-wei, "Design and implementation of high-speed brute forcer for wpa/wpa2-psk [j]," Comput. Eng., vol. 37, no. 10, pp. 125-127, 2011.
-
(2011)
Comput. Eng.
, vol.37
, Issue.10
, pp. 125-127
-
-
Yong-Lei, L.1
Zhi-Gang, J.2
Zhe, C.3
Jing-Wei, L.4
-
4
-
-
84962382537
-
-
T. Labs, Cloudcracker, Nov.
-
T. Labs, Cloudcracker, Nov. 2014. [Online]. Available: http://www.cloudcracker.net
-
(2014)
-
-
-
5
-
-
0004010950
-
-
IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Protected Management Frames 802. 11w-2009
-
IEEE Standard for Information TechnologyTelecommunications and Information Exchange Between SystemsLocal and Metropolitan Area NetworksSpecific Requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Protected Management Frames, IEEE Std. 802. 11w-2009, 2009. [Online]. Available: http://standards.ieee.org/findstds/standard/802.11w-2009.html
-
(2009)
IEEE Std.
-
-
-
7
-
-
84962355889
-
-
Aircrack-ng Nov.
-
Aircrack-ng, Nov. 2014. [Online]. Available: http://www.aircrack-ng.org
-
(2014)
-
-
-
8
-
-
85143166035
-
Security analysis and improvements for IEEE 802. 11i
-
Stanford, CA, USA
-
C. He and J. C. Mitchell, "Security analysis and improvements for IEEE 802. 11i," in Proc. 12th Annu. NDSS Symp., Stanford, CA, USA, 2005, pp. 90-110.
-
(2005)
Proc. 12th Annu. NDSS Symp.
, pp. 90-110
-
-
He, C.1
Mitchell, J.C.2
-
9
-
-
77954404663
-
Analysis and improvements over DoS attacks against IEEE 802. 11i standard
-
L. Wang and B. Srinivasan, "Analysis and improvements over DoS attacks against IEEE 802. 11i standard," in Proc. 2nd Int. Conf. NSWCTC, 2010, vol. 2, pp. 109-113.
-
(2010)
Proc. 2nd Int. Conf. NSWCTC
, vol.2
, pp. 109-113
-
-
Wang, L.1
Srinivasan, B.2
-
10
-
-
84889737981
-
-
Cisco. (2014, Nov.) San Jose, CA, USA
-
Cisco. (2014, Nov. ). Cisco adaptive wireless IPS software, San Jose, CA, USA. [Online]. Available: http://www.cisco.com/c/en/us/products/collateral/wireless/adaptive-wireless-ips-software/data-sheet-c78-501388.pdf
-
Cisco Adaptive Wireless IPS Software
-
-
-
11
-
-
47649094207
-
Towards effective wireless intrusion detection in IEEE 802. 11i
-
A. Tsakountakis, G. Kambourakis, and S. Gritzalis, "Towards effective wireless intrusion detection in IEEE 802. 11i," in Proc. 3rd Int. Workshop SECPerU, 2007, pp. 37-42.
-
(2007)
Proc. 3rd Int. Workshop SECPerU
, pp. 37-42
-
-
Tsakountakis, A.1
Kambourakis, G.2
Gritzalis, S.3
-
12
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802. 11
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: The insecurity of 802. 11," in Proc. 7th Annu. Int. Conf. Mobile Comput. Netw., 2001, pp. 180-189.
-
(2001)
Proc. 7th Annu. Int. Conf. Mobile Comput. Netw.
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
13
-
-
33745904608
-
A survey of WPA and 802. 11i RSN authentication protocols
-
K.-H. Baek, S. W. Smith, and D. Kotz, "A survey of WPA and 802. 11i RSN authentication protocols," Dartmouth College Comput. Sci., Tech. Rep., 2004.
-
(2004)
Dartmouth College Comput. Sci., Tech. Rep.
-
-
Baek, K.-H.1
Smith, S.W.2
Kotz, D.3
-
14
-
-
33751057942
-
Measurements of in-motion 802. 11 networking
-
R. Gass, J. Scott, and C. Diot, "Measurements of in-motion 802. 11 networking," in Proc. 7th IEEE WMCSA, 2005, pp. 69-74.
-
(2005)
Proc. 7th IEEE WMCSA
, pp. 69-74
-
-
Gass, R.1
Scott, J.2
Diot, C.3
-
15
-
-
84962407769
-
-
Nov.
-
The kdd99 Dataset, Nov. 2014. [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/task.html
-
(2014)
The kdd99 Dataset
-
-
-
16
-
-
0006000876
-
-
IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems 802. 16e-2005
-
IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std. 802. 16e-2005, i. s., 2005. [Online]. Available: http://standards.ieee.org/getieee802/download/802.16e-2005.pdf
-
(2005)
IEEE Std.
-
-
-
17
-
-
77952404095
-
-
Eur. Telecommun. Standards Inst. Universal Mobile Telecommunications System (UMTS) 3rd Generation Partnership Project, Cedex, France
-
Eur. Telecommun. Standards Inst. (2011). Universal Mobile Telecommunications System (UMTS); User Equipment (UE) Radio Transmission and Reception (FDD), 3rd Generation Partnership Project, Cedex, France. [Online]. Available: http://www.3gpp.org/specifications/79-specification-numbering
-
(2011)
User Equipment (UE) Radio Transmission and Reception (FDD)
-
-
-
20
-
-
84893799219
-
Real-time detection of denial-of-service attacks in IEEE 802. 11p vehicular networks
-
Jan.
-
N. Lyamin, A. Vinel, M. Jonsson, and J. Loo, "Real-time detection of denial-of-service attacks in IEEE 802. 11p vehicular networks," IEEE Commun. Lett., vol. 18, no. 1, pp. 110-113, Jan. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.1
, pp. 110-113
-
-
Lyamin, N.1
Vinel, A.2
Jonsson, M.3
Loo, J.4
-
21
-
-
84928035601
-
-
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 4: Enhancements for Very High Throughput for Operation in Bands Below 6 GHz, 2013. [Online]. Available: http://standards.ieee.org/getieee802/download/802.11ac-2013.pdf
-
(2013)
Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz
-
-
-
22
-
-
84962382531
-
Denial of service attacks in wireless networks: The case of jammers
-
Jan.
-
L. Devi and A. Suganthi, "Denial of service attacks in wireless networks: The case of jammers," Int. J. Comput. Sci. Mobile Comput., vol. 3, no. 1, pp. 548-558, Jan. 2014.
-
(2014)
Int. J. Comput. Sci. Mobile Comput.
, vol.3
, Issue.1
, pp. 548-558
-
-
Devi, L.1
Suganthi, A.2
-
23
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," in Proc. Sel. Areas Cryptography, 2001, pp. 1-24.
-
(2001)
Proc. Sel. Areas Cryptography
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
24
-
-
33751044071
-
-
Dept. Comput. Sci., Univ. College London, London, U. K.
-
A. Bittau, "Additional weak IV classes for the FMS attack," Dept. Comput. Sci., Univ. College London, London, U. K., 2003.
-
(2003)
Additional Weak IV Classes for the FMS Attack
-
-
Bittau, A.1
-
25
-
-
23344447681
-
WiFi attack vectors
-
Aug.
-
H. Berghel and J. Uecker, "WiFi attack vectors," Commun. ACM, vol. 48, no. 8, pp. 21-28, Aug. 2005.
-
(2005)
Commun. ACM
, vol.48
, Issue.8
, pp. 21-28
-
-
Berghel, H.1
Uecker, J.2
-
26
-
-
77950637056
-
-
Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland, Tech. Rep.
-
R. Chaabouni, "BreakWEPfasterwithstatistical analysis,"Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland, Tech. Rep., 2006.
-
(2006)
Break WEP Fasterwithstatistical Analysis
-
-
Chaabouni, R.1
-
27
-
-
38549101578
-
Breaking 104 bit WEP in less than 60 seconds
-
E. Tews, R.-P. Weinmann, and A. Pyshkin, "Breaking 104 bit WEP in less than 60 seconds," in Proc. 8th Int. Conf. Inf. Security Appl., 2007, pp. 188-202.
-
(2007)
Proc. 8th Int. Conf. Inf. Security Appl.
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.-P.2
Pyshkin, A.3
-
28
-
-
47749085463
-
Attacks on the RC4 stream cipher
-
Sep.
-
A. Klein, "Attacks on the RC4 stream cipher," Des., Codes Cryptography, vol. 48, no. 3, pp. 269-286, Sep. 2008.
-
(2008)
Des., Codes Cryptography
, vol.48
, Issue.3
, pp. 269-286
-
-
Klein, A.1
-
30
-
-
78549267482
-
Survey on security scheme and attacking methods of wpa/wpa2
-
Y. Liu, Z. Jin, and Y. Wang, "Survey on security scheme and attacking methods of wpa/wpa2," in Proc. 6th Int. Conf. WiCOM, 2010, pp. 1-4.
-
(2010)
Proc. 6th Int. Conf. WiCOM
, pp. 1-4
-
-
Liu, Y.1
Jin, Z.2
Wang, Y.3
-
31
-
-
84962456983
-
-
Nov.
-
Kore K, Nov. 2014, Chopchop (experimental WEP attacks). Online]. Available: http://www.netstumbler.org/unix-linux/chopchopexperimental-wep-attacks-t12489.html
-
(2014)
Chopchop (Experimental WEP Attacks)
-
-
Kore, K.1
-
34
-
-
84962342889
-
-
Nov.
-
Hirte attack, Nov. 2014. [Online]. Available: http://www.aircrack-ng.org/doku.php?id=airbase-ng#hirte-attack-in-access-point-mode
-
(2014)
Hirte Attack
-
-
-
35
-
-
15044365053
-
-
IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 5: Enhancements for Higher Throughput 802.11n-2009
-
IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 5: Enhancements for Higher Throughput, IEEE Std. 802. 11n-2009, 2012. [Online]. Available: http://standards.ieee.org/getieee802/download/802.11n-2009.pdf
-
(2012)
IEEE Std.
-
-
-
36
-
-
67349109409
-
Denial-of-service attacks and countermeasures in IEEE 802. 11 wireless networks
-
Sep.
-
K. Bicakci and B. Tavli, "Denial-of-service attacks and countermeasures in IEEE 802. 11 wireless networks," Comput. Standards Interfaces, vol. 31, no. 5, pp. 931-941, Sep. 2009.
-
(2009)
Comput. Standards Interfaces
, vol.31
, Issue.5
, pp. 931-941
-
-
Bicakci, K.1
Tavli, B.2
-
37
-
-
57849139767
-
A lightweight solution for defending against deauthentication/disassociation attacks on 802. 11 networks
-
T. D. Nguyen, D. Nguyen, B. N. Tran, H. Vu, and N. Mittal, "A lightweight solution for defending against deauthentication/disassociation attacks on 802. 11 networks," in Proc. 17th ICCCN, 2008, pp. 1-6.
-
(2008)
Proc. 17th ICCCN
, pp. 1-6
-
-
Nguyen, T.D.1
Nguyen, D.2
Tran, B.N.3
Vu, H.4
Mittal, N.5
-
38
-
-
24144468952
-
Efficiency analysis of burst transmissions with block ACK in contention-based 802. 11e WLANs
-
I. Tinnirello and S. Choi, "Efficiency analysis of burst transmissions with block ACK in contention-based 802. 11e WLANs," in Proc. IEEE ICC, 2005, vol. 5, pp. 3455-3460.
-
(2005)
Proc. IEEE ICC
, vol.5
, pp. 3455-3460
-
-
Tinnirello, I.1
Choi, S.2
-
39
-
-
84962342882
-
-
Review of a MPDU DoS Issue Nov.
-
Review of a MPDU DoS Issue, Nov. 2014. [Online]. Available: https://mentor.ieee.org/802.11/file/07/11-07-2163-01-000n-a-mpdu-securityissues.ppt
-
(2014)
-
-
-
40
-
-
77955856007
-
Empirical studies and queuing modeling of denial of service attacks against 802. 11 WLANs
-
C. Liu, J. Yu, and G. Brewster, "Empirical studies and queuing modeling of denial of service attacks against 802. 11 WLANs," in Proc. IEEE Int. Symp. WoWMoM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE Int. Symp. WoWMoM
, pp. 1-9
-
-
Liu, C.1
Yu, J.2
Brewster, G.3
-
42
-
-
77953120156
-
Null data frame: A doubleedged sword in IEEE 802. 11 WLANs
-
Jul.
-
W. Gu, Z. Yang, D. Xuan, W. Jia, and C. Que, "Null data frame: A doubleedged sword in IEEE 802. 11 WLANs," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 7, pp. 897-910, Jul. 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.7
, pp. 897-910
-
-
Gu, W.1
Yang, Z.2
Xuan, D.3
Jia, W.4
Que, C.5
-
43
-
-
77952313042
-
Empirical analysis of virtual carrier sense flooding attacks over wireless local area network
-
M. Malekzadeh, A. A. Ghani, J. Desa, and S. Subramaniam, "Empirical analysis of virtual carrier sense flooding attacks over wireless local area network," J. Comput. Sci., vol. 5, no. 3, pp. 214-220, 2009.
-
(2009)
J. Comput. Sci.
, vol.5
, Issue.3
, pp. 214-220
-
-
Malekzadeh, M.1
Ghani, A.A.2
Desa, J.3
Subramaniam, S.4
-
45
-
-
49049121903
-
Beacon frame spoofing attack detection in IEEE 802. 11 networks
-
Mar.
-
A. Martinez, U. Zurutuza, R. Uribeetxeberria, M. Fernandez, J. Lizarraga, A. Serna, and I Velez, "Beacon frame spoofing attack detection in IEEE 802. 11 networks," in Proc. 3rd Int. Conf. ARES, Mar. 2008, pp. 520-525.
-
(2008)
Proc. 3rd Int. Conf. ARES
, pp. 520-525
-
-
Martinez, A.1
Zurutuza, U.2
Uribeetxeberria, R.3
Fernandez, M.4
Lizarraga, J.5
Serna, A.6
Velez, I.7
-
46
-
-
4544221258
-
Access points vulnerabilities to DoS attacks in 802. 11 networks
-
F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access points vulnerabilities to DoS attacks in 802. 11 networks," in Proc. WCNC, 2004, pp. 634-638.
-
(2004)
Proc. WCNC
, pp. 634-638
-
-
Ferreri, F.1
Bernaschi, M.2
Valcamonici, L.3
-
47
-
-
76749122922
-
Wireless Honeypots: Survey and assessment
-
N. Al-Gharabally, N. El-Sayed, S. Al-Mulla, and I. Ahmad, "Wireless Honeypots: Survey and assessment," in Proc. Conf. Inf. Sci., Technol. Appl., 2009, pp. 45-52.
-
(2009)
Proc. Conf. Inf. Sci., Technol. Appl.
, pp. 45-52
-
-
Al-Gharabally, N.1
El-Sayed, N.2
Al-Mulla, S.3
Ahmad, I.4
-
48
-
-
77956604585
-
Who is peeping at your passwords at Starbucks? to catch an evil twin access point
-
Y. Song, C. Yang, and G. Gu, "Who is peeping at your passwords at Starbucks? To catch an evil twin access point," in Proc. IEEE/IFIP Int. Conf. DSN, 2010, pp. 323-332.
-
(2010)
Proc. IEEE/IFIP Int. Conf. DSN
, pp. 323-332
-
-
Song, Y.1
Yang, C.2
Gu, G.3
-
49
-
-
80053548870
-
Rogue-access-point detection: Challenges, solutions, future directions
-
Sep. /Oct.
-
R. Beyah and A. Venkataraman, "Rogue-access-point detection: Challenges, solutions, future directions," IEEE Security Privacy, vol. 9, no. 5, pp. 56-61, Sep. /Oct. 2011.
-
(2011)
IEEE Security Privacy
, vol.9
, Issue.5
, pp. 56-61
-
-
Beyah, R.1
Venkataraman, A.2
-
50
-
-
84962355934
-
Rap problems and solutions in 802. 11 wireless LAN
-
Jan.
-
A. M. Patel, A. R. Patel, and H. R. Patel, "Rap problems and solutions in 802. 11 wireless LAN," Int. J., vol. 2, no. 1, pp. 669-674, Jan. 2014.
-
(2014)
Int. J.
, vol.2
, Issue.1
, pp. 669-674
-
-
Patel, A.M.1
Patel, A.R.2
Patel, H.R.3
-
52
-
-
84962403910
-
-
Mdk3 Nov.
-
Mdk3, Nov. 2014. [Online]. Available: http://hack-it.org/index.php? title=Mdk3
-
(2014)
-
-
-
53
-
-
84962403909
-
-
File2air Nov.
-
File2air, Nov. 2014. [Online]. Available: http://www.willhackforsushi.com/?page-id=19
-
(2014)
-
-
-
54
-
-
84962472461
-
-
Lorcon-old source code Nov.
-
Lorcon-old source code, Nov. 2014. [Online]. Available: https://aur.archlinux.org/packages/lorcon-old-git/?setlang=en
-
(2014)
-
-
-
55
-
-
84962472469
-
-
Lorcon2 library Nov.
-
Lorcon2 library, Nov. 2014. [Online]. Available: https://code.google.com/p/lorcon
-
(2014)
-
-
-
56
-
-
84925368904
-
802. 11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802. 11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX Security, 2003, pp. 15-28.
-
(2003)
Proc. USENIX Security
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
57
-
-
84865698436
-
A solution to prevent resource flooding attacks in 802. 11 WLAN
-
L. Arockiam, B. Vani, S. Sivagowry, and A. Persia, "A solution to prevent resource flooding attacks in 802. 11 WLAN," in Proc. Global Trends Comput. Commun. Syst., 2012, pp. 607-616.
-
(2012)
Proc. Global Trends Comput. Commun. Syst.
, pp. 607-616
-
-
Arockiam, L.1
Vani, B.2
Sivagowry, S.3
Persia, A.4
-
58
-
-
79551626084
-
Practical defenses for evil twin attacks in 802. 11
-
H. Gonzales, K. Bauer, J. Lindqvist, D. McCoy, and D. Sicker, "Practical defenses for evil twin attacks in 802. 11," in Proc. IEEE GLOBECOM, 2010, pp. 1-6.
-
(2010)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Gonzales, H.1
Bauer, K.2
Lindqvist, J.3
McCoy, D.4
Sicker, D.5
-
59
-
-
84962472455
-
-
Metasploit Nov.
-
Metasploit, Nov. 2014. [Online]. Available: http://www.metasploit.com
-
(2014)
-
-
-
60
-
-
84962353506
-
-
Wireshark Nov.
-
Wireshark, Nov. 2014. [Online]. Available: http://www.wireshark.org
-
(2014)
-
-
-
63
-
-
84919328325
-
Role of feature selection in intrusion detection systems for 802. 11 networks
-
N. P. Neelakantan and C. Nagesh, "Role of feature selection in intrusion detection systems for 802. 11 networks," Int. J. Smart Sensors Ad Hoc Netw., vol. 1, no. 1, pp. 98-101, 2011.
-
(2011)
Int. J. Smart Sensors Ad Hoc Netw.
, vol.1
, Issue.1
, pp. 98-101
-
-
Neelakantan, N.P.1
Nagesh, C.2
-
64
-
-
78751649037
-
DoS attacks exploiting signaling in UMTS and IMS
-
G. Kambourakis, C. Kolias, S. Gritzalis, and J. H. Park, "DoS attacks exploiting signaling in UMTS and IMS," Comput. Commun., vol. 34, no. 3, pp. 226-235, 2011.
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 226-235
-
-
Kambourakis, G.1
Kolias, C.2
Gritzalis, S.3
Park, J.H.4
-
65
-
-
84873738656
-
Attacks and countermeasures on 802. 16: Analysis and assessment
-
C. Kolias, G. Kambourakis, and S. Gritzalis, "Attacks and countermeasures on 802. 16: Analysis and assessment," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 487-514, 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 487-514
-
-
Kolias, C.1
Kambourakis, G.2
Gritzalis, S.3
-
66
-
-
80955142722
-
Swarm intelligence in intrusion detection: A survey
-
C. Kolias, G. Kambourakis, and M. Maragoudakis, "Swarm intelligence in intrusion detection: A survey," Comput. Security, vol. 30, no. 8, pp. 625-642, 2011.
-
(2011)
Comput. Security
, vol.30
, Issue.8
, pp. 625-642
-
-
Kolias, C.1
Kambourakis, G.2
Maragoudakis, M.3
-
67
-
-
65249107163
-
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
-
Jan. /Feb.
-
J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection," IEEE Netw., vol. 23, no. 1, pp. 42-47, Jan. /Feb. 2009.
-
(2009)
IEEE Netw.
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, H.-H.4
-
68
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Appl. Soft Comput., vol. 10, no. 1, pp. 1-35, 2010.
-
(2010)
Appl. Soft Comput.
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
|