-
1
-
-
84949223752
-
-
S. Fluhrer, I. Mantin and A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4. Selected Areas in Cryptography, 8th Annual International Workshop, SAC, Toronto, Ontario, Canada (Springer-Verlag Berlin Heidelberg 2001), pp. 1–24.
-
(2001)
Ontario, Canada (Springer-Verlag Berlin Heidelberg
, pp. 1-24
-
-
-
2
-
-
85177214291
-
Intercepting mobile communications: The insecurity of 802.11. In the proceedings of the Seventh Annual International Conference on Mobile Computing And Networking
-
N. Borisov, I. Goldberg and D. Wagner, Intercepting mobile communications: The insecurity of 802.11. In the proceedings of the Seventh Annual International Conference on Mobile Computing And Networking, ACM New York USA, pp. 16–21 (2001).
-
(2001)
ACM New York USA
, pp. 16-21
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
4
-
-
38549101578
-
Breaking 104 bit WEP in less than 60 seconds. In the Proceedings of the 8th International Conference on Information Security Applications
-
E. Tews, R. P. Weinmann and A. Pyshkin, Breaking 104 bit WEP in less than 60 seconds. In the Proceedings of the 8th International Conference on Information Security Applications, Springer Verlag Berlin Heidelberg, pp. 188–202 (2007).
-
(2007)
Springer Verlag Berlin Heidelberg
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.P.2
Pyshkin, A.3
-
5
-
-
70450239506
-
A. Y.Teymorian, X. Cheng and M. Song, RAP: Protecting commodity Wi-Fi networks from rogue access points. In the Proceedings of Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and Workshops
-
L. Ma, A. Y.Teymorian, X. Cheng and M. Song, RAP: Protecting commodity Wi-Fi networks from rogue access points. In the Proceedings of Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and Workshops, ACM New York USA, pp. 1–7 (2007).
-
(2007)
ACM New York USA
, pp. 1-7
-
-
Ma, L.1
-
6
-
-
84881131278
-
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. Computer Network Security, 6th International Conference on Mathematical Methods
-
Y. B. Mustapha, H. Debar and G. Jacob, Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. Computer Network Security, 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (Springer-Verlag Berlin Heidelberg 2012), pp. 203–217.
-
(2012)
Models and Architectures for Computer Network Security (Springer-Verlag Berlin Heidelberg
, pp. 203-217
-
-
Mustapha, Y.B.1
Debar, H.2
Jacob, G.3
-
7
-
-
84946398426
-
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
-
J. Levine, R. L. Bella, H. Owen, D. Contis and B. Culve, The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks, In the Proceedings of IEEE Workshop on Information AssuranceNew York USA, 2003. pp. 92–99.
-
(2003)
In the Proceedings of IEEE Workshop on Information AssuranceNew York USA
, pp. 92-99
-
-
Levine, J.1
Bella, R.L.2
Owen, H.3
Contis, D.4
Culve, B.5
-
8
-
-
18144401989
-
Rogue access point detection using temporal traffic characteristics
-
R. Beyah, S. Kangude, G. Yu, B. Strickland and J. Copeland, Rogue access point detection using temporal traffic characteristics. In the Proceedings of IEEE Conference on Global Telecommunications (GLOBECOM), pp. 2271–2275 (2004).
-
(2004)
In the Proceedings of IEEE Conference on Global Telecommunications (GLOBECOM)
, pp. 2271-2275
-
-
Beyah, R.1
Kangude, S.2
Yu, G.3
Strickland, B.4
Copeland, J.5
-
9
-
-
85013366435
-
-
Motorola Solusions. AirDefense Enterprise: a wireless intrusion prevention, 2011
-
Motorola Solusions. AirDefense Enterprise: a wireless intrusion prevention, 2011.
-
-
-
-
10
-
-
11244291937
-
Adya
-
A. Adya, P. Bahl, R. Chandra and L. Qiu, Architecture and techniques for diagnosing faults in ieee 802.11 infrastructure networks. In the Proceedings of 10th Annual International Conference on Mobile Computing and Networking (MobiCom), ACM New York, USA, pp. 30–44 (2004).
-
(2004)
P. Bahl, R. Chandra and L. Qiu, Architecture and techniques for diagnosing faults in ieee 802.11 infrastructure networks. In the Proceedings of 10th Annual International Conference on Mobile Computing and Networking (MobiCom), ACM New York, USA
, pp. 30-44
-
-
-
11
-
-
33748979867
-
Bahl
-
P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman and B. Zill, Enhancing the security of corporate wi-fi networks using DAIR. In the Proceedings of 10th Annual International Conference on Mobile Computing and Networking (MobiCom), ACM New York, USA, pp. 1–14 (2006).
-
(2006)
R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman and B. Zill, Enhancing the security of corporate wi-fi networks using DAIR. In the Proceedings of 10th Annual International Conference on Mobile Computing and Networking (MobiCom), ACM New York, USA
, pp. 1-14
-
-
-
13
-
-
84898862402
-
Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security, Springer
-
J. Milliken, V. Selis and A. Marshall, Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security, Springer, No. 1, (2013).
-
(2013)
No
, pp. 1
-
-
Milliken, J.1
Selis, V.2
Marshall, A.3
-
14
-
-
84930537693
-
Wireless rogue access point detection using shadow honeynet. International Journal of Wireless Personal Communications
-
N. Agrawal and S. Tapaswi, Wireless rogue access point detection using shadow honeynet. International Journal of Wireless Personal Communications, Springer Science+Business Media New York, Vol. 83, No. 1, pp. 551–570 (2015).
-
(2015)
Springer Science+Business Media New York
, vol.83
, Issue.1
, pp. 551-570
-
-
Agrawal, N.1
Tapaswi, S.2
-
17
-
-
77952556572
-
Design of SNORT based hybrid Intrusion Detection System. Distributed Computing, Artificial Intelligence, Bioinformatics
-
Z. Gomez, C. Gil, N. Padilla, R. Banos and C. Jimenez, Design of SNORT based hybrid Intrusion Detection System. Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living, 10th International Work-Conference on Artificial Neural Networks (Springer-Verlag Berlin Heidelberg 2009), pp. 515–522.
-
(2009)
Soft Computing, and Ambient Assisted Living, 10th International Work-Conference on Artificial Neural Networks (Springer-Verlag Berlin Heidelberg
, pp. 515-522
-
-
Gomez, Z.1
Gil, C.2
Padilla, N.3
Banos, R.4
Jimenez, C.5
-
18
-
-
38349014401
-
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts, Computer and Network Security (Springer-Verlag
-
J. Song, H. Ohba, H. Takakura, Y. Okabe, K. Ohira and Y. Kwon, A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts, Computer and Network Security (Springer-Verlag, Berlin HeidelbergAdvances in Computer Science ASIAN, 2007. pp. 247–253.)
-
(2007)
Berlin HeidelbergAdvances in Computer Science ASIAN
, pp. 247-253
-
-
Song, J.1
Ohba, H.2
Takakura, H.3
Okabe, Y.4
Ohira, K.5
Kwon, Y.6
-
20
-
-
85013377676
-
-
http://ettercap.github.io/ettercap/
-
-
-
-
21
-
-
85013450418
-
-
http://www.wireshark.org/
-
-
-
-
22
-
-
85013366532
-
-
http://www.snort.org/
-
-
-
-
23
-
-
85013366535
-
-
https://www.pfsense.org/
-
-
-
-
24
-
-
85013394307
-
-
https://doc.pfsense.org/index.php/Setup_Snort_Package
-
-
-
-
25
-
-
85013450412
-
-
http://www.keyfocus.net/kfsensor/
-
-
-
|