메뉴 건너뛰기




Volumn 2005-January, Issue , 2005, Pages 170-171

802.11 network intrusion detection using genetic programming

Author keywords

802.11; denial of service; genetic programming; intrusion detection; WiFi

Indexed keywords

DENIAL-OF-SERVICE ATTACK; GENETIC ALGORITHMS; IEEE STANDARDS; INTRUSION DETECTION; NETWORK SECURITY; PATTERN RECOGNITION; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 85139567592     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102256.1102295     Document Type: Conference Paper
Times cited : (11)

References (8)
  • 1
    • 84876266009 scopus 로고    scopus 로고
    • AusCERT. AusCERT AA-2004.02, Australian Computer Emergency Response Team, 13 May 2004
    • AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices. AusCERT AA-2004.02, Australian Computer Emergency Response Team, http://www.auscert.org.au/render.html?it=4091, 13 May 2004.
    • Denial of Service Vulnerability in IEEE 802.11 Wireless Devices
  • 2
    • 85139566976 scopus 로고    scopus 로고
    • IEEE-SA Standards Board. ANSI/IEEE Std 802.11, 1999 Edition (R2003). IEEE, New York, NY, USA, 1999
    • IEEE-SA Standards Board. ANSI/IEEE Std 802.11, 1999 Edition (R2003). IEEE, New York, NY, USA, 1999.
  • 3
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: real vulnerabilities and practical solutions
    • J.Bellardo and S.Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In USENIX Security Symposium, pages 15-28, 2003.
    • (2003) USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 6
    • 85139554620 scopus 로고    scopus 로고
    • On the efficient mining of network audit data using genetic programming
    • Seattle, Washington, USA, 26-30 June 2004
    • D. Song, R. Curry, M. I. Heywood, and A. N. Zincir-Heywood. On the efficient mining of network audit data using genetic programming. In GECCO 2004 Workshop Proceedings, Seattle, Washington, USA, 26-30 June 2004.
    • GECCO 2004 Workshop Proceedings
    • Song, D.1    Curry, R.2    Heywood, M.I.3    Zincir-Heywood, A.N.4
  • 7
  • 8
    • 4544317724 scopus 로고    scopus 로고
    • Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack
    • Atlanta Ga., March
    • S. T, L. Y.-X., and H. Owen. Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack. In IEEE Wireless Communications and Networking Conference, Atlanta Ga., March 2004.
    • (2004) IEEE Wireless Communications and Networking Conference
    • Owen, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.