-
1
-
-
84925368904
-
-
Bellardo, J. & Savage, S. (2003). 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX security symposium, Washington, DC, USA, August 4–8, 2003.
-
(2003)
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX security symposium, Washington, DC, USA, August 4–8, 2003
-
-
Bellardo, J.1
Savage, S.2
-
2
-
-
3042619294
-
-
Ding, P., Holliday, J. & Celik, A. (2004). Improving the security of wireless LANs by managing 802.1x disassociation. In Proceedings of the IEEE consumer communications and networking conference, Las Vegas, NV, USA, January 5–8, 2004.
-
(2004)
Improving the security of wireless LANs by managing 802.1x disassociation. In Proceedings of the IEEE consumer communications and networking conference, Las Vegas, NV, USA, January 5–8, 2004
-
-
Ding, P.1
Holliday, J.2
Celik, A.3
-
3
-
-
33745745418
-
-
LaRoche, P., & Zincir-Heywood, A. N. (2006). 802.11 de-authentication attack detection using genetic programming. In P. Collet, M. Tomassini, M. Ebner, S. Gustafson & A. Ekárt (Eds.), Lecture notes in computer science (Vol. 3905, pp. 1–12). Berlin: Springer.
-
(2006)
802.11 de-authentication attack detection using genetic programming. In P. Collet, M. Tomassini, M. Ebner, S. Gustafson & A. Ekárt (Eds.), Lecture notes in computer science (Vol. 3905, pp. 1–12). Berlin: Springer
-
-
LaRoche, P.1
Zincir-Heywood, A.N.2
-
4
-
-
84890120877
-
Impact of metric selection on wireless deauthentication DoS attack performance
-
Milliken, J., Selis, V., Yap, K. M., & Marshall, A. (2013). Impact of metric selection on wireless deauthentication DoS attack performance. IEEE Wireless Communication Letters, 2(5), 571–574.
-
(2013)
IEEE Wireless Communication Letters
, vol.2
, Issue.5
, pp. 571-574
-
-
Milliken, J.1
Selis, V.2
Yap, K.M.3
Marshall, A.4
-
5
-
-
85026452241
-
IEEE standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements, Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 4: Protected management frames
-
IEEE, Press
-
IEEE WG. (2009). IEEE standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements, Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 4: Protected management frames. Approved on September 11, 2009 by IEEE SA-Standards Board, IEEE Press.
-
(2009)
Approved on September 11, 2009 by IEEE SA-Standards Board
-
-
-
6
-
-
0036966442
-
-
Johnson, H., Nilsson, A., Fu, J., Wu, S. F., Chen, A. & Huang, H. (2002). SOLA: A one-bit identity authentication protocol for access control. In Proceedings of IEEE global telecommunications conference, Taipei, Taiwan (pp. 768–772), November 17–21, 2002.
-
(2002)
SOLA: A one-bit identity authentication protocol for access control. In Proceedings of IEEE global telecommunications conference, Taipei, Taiwan (pp. 768–772), November 17–21, 2002
-
-
Johnson, H.1
Nilsson, A.2
Fu, J.3
Wu, S.F.4
Chen, A.5
Huang, H.6
-
7
-
-
3142761839
-
-
Wang, H. & Velayutham, A. (2003). An enhanced one-bit identity authentication protocol for access control in IEEE 802.11. In Proceedings of IEEE military communications conference, Boston, MA, USA (pp. 839–843), October 13–16, 2003.
-
(2003)
An enhanced one-bit identity authentication protocol for access control in IEEE 802.11. In Proceedings of IEEE military communications conference, Boston, MA, USA (pp. 839–843), October 13–16, 2003
-
-
Wang, H.1
Velayutham, A.2
-
8
-
-
47249138707
-
-
Aslam, B., Islam, M. H. & Khan, S. A. (2006). Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack. In Proceedings of the first international conference on mobile computing and wireless communication (MCWC 2006), Amman, Jordan (pp. 215–220), September 17–20, 2006.
-
(2006)
Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack. In Proceedings of the first international conference on mobile computing and wireless communication (MCWC 2006), Amman, Jordan (pp. 215–220), September 17–20, 2006
-
-
Aslam, B.1
Islam, M.H.2
Khan, S.A.3
-
9
-
-
51049101064
-
-
Khan, M. A. & Hasan, A. (2008). Pseudo random number based authentication to counter denial of service attacks on 802.11. In 5th IFIP international conference on wireless and optical communications networks (WOCN ‘08), Surabaya, East Java, Indonesia (pp. 1–5), May 5–7, 2008.
-
(2008)
Pseudo random number based authentication to counter denial of service attacks on 802.11. In 5th IFIP international conference on wireless and optical communications networks (WOCN ‘08), Surabaya, East Java, Indonesia (pp. 1–5), May 5–7, 2008
-
-
Khan, M.A.1
Hasan, A.2
-
10
-
-
57849139767
-
-
Nguyen, T. D., Nguyen, D., Tran, B. N., Vu, H. & Mittal, N. (2008). A lightweight solution for defending against deauthentication/disassociation attacks on 802.11 networks. In Proceedings of 17th international conference on computer communications and networks (ICCCN ‘08), St. Thomas, US Virgin Islands (pp. 1–6), August 3–7, 2008.
-
(2008)
A lightweight solution for defending against deauthentication/disassociation attacks on 802.11 networks. In Proceedings of 17th international conference on computer communications and networks (ICCCN ‘08), St. Thomas, US Virgin Islands (pp. 1–6), August 3–7, 2008
-
-
Nguyen, T.D.1
Nguyen, D.2
Tran, B.N.3
Vu, H.4
Mittal, N.5
-
11
-
-
84894478047
-
-
Agarwal, M., Biswas, S. & Nandi, S. (2013). Detection of de-authentication denial of service attack in 802.11 networks. In 2013 annual IEEE India conference (INDICON), Mumbai, India (pp. 1–6), December 13–15, 2013.
-
(2013)
Detection of de-authentication denial of service attack in 802.11 networks. In 2013 annual IEEE India conference (INDICON), Mumbai, India (pp. 1–6), December 13–15, 2013
-
-
Agarwal, M.1
Biswas, S.2
Nandi, S.3
-
12
-
-
78651327750
-
-
Mar, J., Yeh, Y. C. & Hsiao, I. F. (2010). An ANFIS-IDS against deauthentication DoS attacks for a WLAN. In 2010 international symposium on information theory and its applications (ISITA), Taichung, Taiwan (pp. 548–553), October 17–20, 2010.
-
(2010)
An ANFIS-IDS against deauthentication DoS attacks for a WLAN. In 2010 international symposium on information theory and its applications (ISITA), Taichung, Taiwan (pp. 548–553), October 17–20, 2010
-
-
Mar, J.1
Yeh, Y.C.2
Hsiao, I.F.3
-
13
-
-
80051903947
-
Short paper: security evaluation of IEEE 802.11w specification
-
Sohail Ahmad, Md. Tadakamadla, S. (2011) In
-
Sohail Ahmad, Md. & Tadakamadla, S. (2011). Short paper: security evaluation of IEEE 802.11w specification. In Proceedings of the fourth ACM conference on wireless network security, Hamburg, Germany (pp. 53–58), June 14–17, 2011.
-
(2011)
Proceedings of the fourth ACM conference on wireless network security, Hamburg, Germany (53–58), June 14–17
-
-
-
14
-
-
84555178524
-
-
Wang, W. & Wang, H. (2011). Weakness in 802.11w and an improved mechanism on protection of management frame. In 2011 international conference on wireless communications and signal processing (WCSP), Nanjing, China (pp. 1–4), November 9–11, 2011.
-
(2011)
Weakness in 802.11w and an improved mechanism on protection of management frame. In 2011 international conference on wireless communications and signal processing (WCSP), Nanjing, China (pp. 1–4), November 9–11, 2011
-
-
Wang, W.1
Wang, H.2
-
15
-
-
84861639032
-
-
Eian, M. & Mjolsnes, S. F. (2012). A formal analysis of IEEE 802.11w deadlock vulnerabilities. In 2012 Proceedings IEEE INFOCOM, Orlando, Florida, USA (pp. 918–926), March 25–30, 2012.
-
(2012)
A formal analysis of IEEE 802.11w deadlock vulnerabilities. In 2012 Proceedings IEEE INFOCOM, Orlando, Florida, USA (pp. 918–926), March 25–30, 2012
-
-
Eian, M.1
Mjolsnes, S.F.2
-
16
-
-
68849088469
-
Fragility of the robust security network: 802.11 denial of service
-
Berlin, Springer
-
Eian, M. (2009). Fragility of the robust security network: 802.11 denial of service. In M. Abdalla, D. Pointcheval, P.-A. Fouque & D. Vergnaud (Eds.), Lecture notes in computer science (Vol. 5536, pp. 400–416). Berlin: Springer.
-
(2009)
Lecture notes in computer science
, vol.5536
, pp. 400-416
-
-
Eian, M.1
-
17
-
-
84878630477
-
Formal verification of IEEE 802.11 authentication protocols
-
Raju, K., & Krishnam, V. (2013). Formal verification of IEEE 802.11 authentication protocols. Journal of Networks, 8(4), 769–778.
-
(2013)
Journal of Networks
, vol.8
, Issue.4
, pp. 769-778
-
-
Raju, K.1
Krishnam, V.2
-
18
-
-
85026456830
-
-
Last Accessed on 27 April 2015
-
OpenWrt Web Site. (2015). https://openwrt.org. Last Accessed on 27 April 2015.
-
(2015)
-
-
-
19
-
-
85026461475
-
-
Ath9k Driver Web Site. Last Accessed on 27 April 2015
-
Ath9k Driver Web Site. (2015). http://www.linuxwireless.org/en/users/Drivers/ath9k. Last Accessed on 27 April 2015.
-
(2015)
Ath9k Driver Web Site
-
-
-
20
-
-
85026466545
-
-
Last Accessed on 27 April 2015
-
Hostapd Web Site. (2015). http://w1.fi/hostapd. Last Accessed on 27 April 2015.
-
(2015)
-
-
Site, H.W.1
-
21
-
-
85026441862
-
-
Void11 Web Site. Last Accessed on 25 January 2009
-
Void11 Web Site. (2009). http://wirelessdefence.org/Contents/Void11Main.htm. Last Accessed on 25 January 2009.
-
(2009)
-
-
-
23
-
-
81455149390
-
-
Syngress, Rockland, MA
-
Wall, D., Faircloth, J., Barrett, J., & Kanclirz, J. (2004). Managing and securing a cisco SWAN [ILLUSTRATED] (pp. 429–430). Rockland, MA: Syngress.
-
(2004)
Managing and securing a cisco SWAN [ILLUSTRATED]
, pp. 429-430
-
-
Wall, D.1
Faircloth, J.2
Barrett, J.3
Kanclirz, J.4
-
25
-
-
57849109455
-
-
Ding, Q., Zhang, X., Li, X. & Zhou, X. (2008). Reputation based access point selection in 802.11 network. In Third international conference on convergence and hybrid information technology, Busan, Korea (pp. 324–329), November 11–13, 2008.
-
(2008)
Reputation based access point selection in 802.11 network. In Third international conference on convergence and hybrid information technology, Busan, Korea (pp. 324–329), November 11–13, 2008
-
-
Ding, Q.1
Zhang, X.2
Li, X.3
Zhou, X.4
-
26
-
-
21244453877
-
Study of the TCP upstream/downstream unfairness issue with per-flow queuing over infrastructure-mode WLANs
-
Wu, Y., Niu, Z., & Zhu, J. (2005). Study of the TCP upstream/downstream unfairness issue with per-flow queuing over infrastructure-mode WLANs. Wireless Communications and Mobile Computing, 5(4), 459–471.
-
(2005)
Wireless Communications and Mobile Computing
, vol.5
, Issue.4
, pp. 459-471
-
-
Wu, Y.1
Niu, Z.2
Zhu, J.3
-
27
-
-
85026455219
-
-
Dao-Thi, T. H. & Mairesse, J. (2006). Queueing systems I: Zero-automatic networks. In Proceedings of the 1st international conference on performance evaluation methodologies and tools, Pisa, Italy, October 11–13, 2006.
-
(2006)
Queueing systems I: Zero-automatic networks. In Proceedings of the 1st international conference on performance evaluation methodologies and tools, Pisa, Italy, October 11–13, 2006
-
-
Dao-Thi, T.H.1
Mairesse, J.2
-
28
-
-
33645359308
-
-
Discrete Mathematics and Theoretical Computer Science, Paris, France, AC
-
Draief, M., Mairesse, J., & O’Connell, N. (2003). Joint burke’s theorem and RSK representation for a queue and a store. Discrete Mathematics and Theoretical Computer Science, Paris, France, AC, pp. 69–82.
-
(2003)
Joint burke’s theorem and RSK representation for a queue and a store
, pp. 69-82
-
-
Draief, M.1
Mairesse, J.2
O’Connell, N.3
-
29
-
-
0004176587
-
-
Prentice Hall, Upper Saddle River, NJ
-
Menascé, D. A., & Almeida, V. A. F. (1998). Capacity planning for web performance: Metrics, models, and methods. Upper Saddle River, NJ: Prentice Hall.
-
(1998)
Capacity planning for web performance: Metrics, models, and methods
-
-
Menascé, D.A.1
Almeida, V.A.F.2
-
30
-
-
1842440583
-
-
Prentice Hall, Upper Saddle River, NJ
-
Menascé, D. A., Almeida, V. A. F., & Dowdy, L. W. (2004). Performance by design: Computer capacity planning by example. Upper Saddle River, NJ: Prentice Hall.
-
(2004)
Performance by design: Computer capacity planning by example
-
-
Menascé, D.A.1
Almeida, V.A.F.2
Dowdy, L.W.3
|