-
2
-
-
84979659923
-
-
Android 6.0 changes. Retrieved from https://developer.android.com/about/versions/ marshmallow/android-6.0-changes.html, 2015.
-
(2015)
Android 6.0 Changes
-
-
-
3
-
-
84979662144
-
-
O. Abukmail. Wifi Mac Changer. Retrieved from https://play.google.com/store/apps/ details?id=com.wireless.macchanger.
-
Wifi Mac Changer
-
-
Abukmail, O.1
-
4
-
-
84890071264
-
-
Retrieved 10 November, 2015, from, Sept
-
M. V. Barbera, A. Epasto, A. Mei, S. Kosta, V. C. Perta, and J. Stefa. CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10). Retrieved 10 November, 2015, from, http://crawdad.org/sapienza/ probe-requests/20130910, Sept. 2013.
-
(2013)
CRAWDAD Dataset Sapienza/probe-requests (V. 2013-09-10)
-
-
Barbera, M.V.1
Epasto, A.2
Mei, A.3
Kosta, S.4
Perta, V.C.5
Stefa, J.6
-
6
-
-
84928027492
-
The scrambler attack: A robust physical layer attack on location privacy in vehicular networks
-
B. Bloessl, C. Sommer, F. Dressler, and D. Eckhoff. The scrambler attack: A robust physical layer attack on location privacy in vehicular networks. In ICNC, 2015.
-
(2015)
ICNC
-
-
Bloessl, B.1
Sommer, C.2
Dressler, F.3
Eckhoff, D.4
-
7
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In MobiCom, 2008.
-
(2008)
MobiCom
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
8
-
-
84979659912
-
Wi-Fi internet connectivity and privacy: Hiding your tracks on the wireless internet
-
P. O. Carlos J. Bernardos, Juan Carlos Zúńiga. Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless internet. In IEEE CSCN, 2015.
-
(2015)
IEEE CSCN
-
-
Carlos Bernardos, P.O.J.1
Zúńiga, J.C.2
-
9
-
-
84979668284
-
-
Chainfire. Pry-Fi. Retrieved from https://play.google.com/store/apps/ details?id=eu.chainfire.pryfi.
-
Chainfire. Pry-Fi
-
-
-
10
-
-
84880172913
-
Fingerprinting smartphones remotely via ICMP timestamps
-
M. Cristea and B. Groza. Fingerprinting smartphones remotely via ICMP timestamps. Communications Letters, IEEE, 17(6):1081-1083, 2013.
-
(2013)
Communications Letters, IEEE
, vol.17
, Issue.6
, pp. 1081-1083
-
-
Cristea, M.1
Groza, B.2
-
12
-
-
84871231488
-
On physical-layer identification of wireless devices
-
B. Danev, D. Zanetti, and S. Capkun. On physical-layer identification of wireless devices. ACM Computing Surveys (CSUR), 45(1):6, 2012.
-
(2012)
ACM Computing Surveys (CSUR)
, vol.45
, Issue.1
, pp. 6
-
-
Danev, B.1
Zanetti, D.2
Capkun, S.3
-
13
-
-
84979673965
-
Snoopy: Distributed tracking and profiling framework
-
C. Daniel and W. Glenn. Snoopy: Distributed tracking and profiling framework. In 44Con 2012, 2012.
-
(2012)
44Con 2012
-
-
Daniel, C.1
Glenn, W.2
-
15
-
-
84887772434
-
Identifying unique devices through wireless fingerprinting
-
L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In WiSec, 2008.
-
(2008)
WiSec
-
-
Desmond, L.C.C.1
Yuan, C.C.2
Pheng, T.C.3
Lee, R.S.4
-
17
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.V.5
Sicker, D.6
-
18
-
-
84962030770
-
How talkative is your mobile device? An experimental study of Wi-Fi probe requests
-
J. Freudiger. How talkative is your mobile device? An experimental study of Wi-Fi probe requests. In WiSec, 2015.
-
(2015)
WiSec
-
-
Freudiger, J.1
-
19
-
-
84904131498
-
NSA tracking cellphone locations worldwide Snowden documents show
-
B. Gellman and A. Soltani. NSA tracking cellphone locations worldwide, Snowden documents show. The Washington Post, 2013.
-
(2013)
The Washington Post
-
-
Gellman, B.1
Soltani, A.2
-
20
-
-
84857214315
-
Channel bounding and MAC protection mechanisms for 802.11ac
-
M. X. Gong, B. Hart, L. Xia, and R. Want. Channel bounding and MAC protection mechanisms for 802.11ac. In GLOBECOM, 2011.
-
(2011)
GLOBECOM
-
-
Gong, M.X.1
Hart, B.2
Xia, L.3
Want, R.4
-
21
-
-
84950333168
-
A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac)
-
F. Gont. A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac). RFC 7217, 2014.
-
(2014)
RFC 7217
-
-
Gont, F.1
-
22
-
-
84979699005
-
No this isn't a scene from minority report. This trash can is stalking you
-
D. Goodin. No, this isn't a scene from minority report. This trash can is stalking you. Ars Technica, 2013.
-
(2013)
Ars Technica
-
-
Goodin, D.1
-
23
-
-
84866362077
-
Can Ferris Bueller still have his day off? Protecting privacy in the wireless era
-
B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno, S. Seshan, and D. Wetherall. Can Ferris Bueller still have his day off? protecting privacy in the wireless era. In USENIX HotOS, 2007.
-
(2007)
USENIX HotOS
-
-
Greenstein, B.1
Gummadi, R.2
Pang, J.3
Chen, M.Y.4
Kohno, T.5
Seshan, S.6
Wetherall, D.7
-
25
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. Mobile Networks and Applications, 10(3):315-325, 2005.
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
26
-
-
43249097835
-
Sequence number-based MAC address spoof detection
-
F. Guo and T. Chiueh. Sequence number-based MAC address spoof detection. In RAID, 2006.
-
(2006)
RAID
-
-
Guo, F.1
Chiueh, T.2
-
30
-
-
78650012686
-
Mobile location tracking in metro areas: Malnets and others
-
N. Husted and S. Myers. Mobile location tracking in metro areas: Malnets and others. In CCS, 2010.
-
(2010)
CCS
-
-
Husted, N.1
Myers, S.2
-
33
-
-
60349083720
-
On fast and accurate detection of unauthorized wireless access points using clock skews
-
S. Jana and S. K. Kasera. On fast and accurate detection of unauthorized wireless access points using clock skews. In MobiCom, 2008.
-
(2008)
MobiCom
-
-
Jana, S.1
Kasera, S.K.2
-
35
-
-
70349139640
-
Privacy-preserving 802.11 access-point discovery
-
J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi, J. Maki, and M. Roe. Privacy-preserving 802.11 access-point discovery. In WiSec, 2009.
-
(2009)
WiSec
-
-
Lindqvist, J.1
Aura, T.2
Danezis, G.3
Koponen, T.4
Myllyniemi, A.5
Maki, J.6
Roe, M.7
-
37
-
-
84873481534
-
Tracking unmodified smartphones using Wi-Fi monitors
-
A. B. M. Musa and J. Eriksson. Tracking unmodified smartphones using Wi-Fi monitors. In SenSys, 2012.
-
(2012)
SenSys
-
-
Musa, A.B.M.1
Eriksson, J.2
-
38
-
-
84941261912
-
CreepyDOL: Cheap, distributed stalking
-
B. O'Connor. CreepyDOL: Cheap, distributed stalking. In BlackHat, 2013.
-
(2013)
BlackHat
-
-
O'Connor, B.1
-
39
-
-
37749006403
-
802.11 user fingerprinting
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In MobiCom, 2007.
-
(2007)
MobiCom
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
41
-
-
84978241998
-
The NSA's secret role in the U.S. Assassination program
-
J. Scahill and G. Greenwald. The NSA's secret role in the U.S. assassination program. The Intercept, 2014.
-
(2014)
The Intercept
-
-
Scahill, J.1
Greenwald, G.2
-
43
-
-
84879515461
-
Who do you sync you are?: Smartphone fingerprinting via application behaviour
-
T. Sẗober, M. Frank, J. Schmitt, and I. Martinovic. Who do you sync you are?: smartphone fingerprinting via application behaviour. In WiSec, 2013.
-
(2013)
WiSec
-
-
Sẗober, T.1
Frank, M.2
Schmitt, J.3
Martinovic, I.4
-
44
-
-
44449164500
-
An overview of peak-to-average power ratio reduction techniques for OFDM systems
-
L. Wang and C. Tellambura. An overview of peak-to-average power ratio reduction techniques for OFDM systems. In IEEE ISSPIT, 2006.
-
(2006)
IEEE ISSPIT
-
-
Wang, L.1
Tellambura, C.2
|