Types and Origins of Fingerprints
暂无分享,去创建一个
[1] Jeyanthi Hall,et al. Detection of rogue devices in wireless networks , 2006 .
[2] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[3] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.
[4] B. Yener,et al. Active Attacks Against Modulation-based Radiometric Identification , 2009 .
[5] O. H. Tekbas,et al. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.
[6] Witold Kinsner,et al. A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.
[7] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[8] Srdjan Capkun,et al. Physical-Layer Identification of Wireless Devices , 2011 .
[9] W. Kinsner,et al. Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.
[10] Chih-Ming Wang,et al. Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards , 2009, IEEE Transactions on Microwave Theory and Techniques.
[11] Michael A. Temple,et al. Improving Intra-Cellular Security Using Air Monitoring with RF Fingerprints , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[12] Jia Di,et al. Fingerprinting RFID Tags , 2011, IEEE Transactions on Dependable and Secure Computing.
[13] Dale R. Thompson,et al. Fingerprinting Radio Frequency Identification Tags Using Timing Characteristics , 2009 .
[14] Jiri Matas,et al. On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[15] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[16] Srdjan Capkun,et al. Attacks on public WLAN-based positioning systems , 2009, MobiSys '09.
[17] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[18] Anil K. Jain,et al. Feature Selection: Evaluation, Application, and Small Sample Performance , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[19] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[20] Mala Mitra,et al. Privacy for RFID Systems to Prevent Tracking and Cloning , 2008 .
[21] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[22] Robert F. Mills,et al. Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.
[23] N. Serinken,et al. Characteristics of radio transmitter fingerprints , 2001 .
[24] Robert F. Mills,et al. Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[25] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[26] Anil K. Jain,et al. Statistical Pattern Recognition: A Review , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[27] Srdjan Capkun,et al. On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem? , 2011, PETS.
[28] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[29] Chih-Ming Wang,et al. Identifying RF Identification Cards From Measurements of Resonance and Carrier Harmonics , 2010, IEEE Transactions on Microwave Theory and Techniques.
[30] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[31] Arun Ross,et al. Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.
[32] Michael A. Temple,et al. Application of wavelet denoising to improve OFDM-based signal detection and classification , 2010, Secur. Commun. Networks.
[33] Sigeru Omatu,et al. Identification of the defective transmission devices using the wavelet transform , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[34] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[35] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[36] O. H. Tekbas,et al. Improvement of transmitter identification system for low SNR transients , 2004 .
[37] Srdjan Capkun,et al. Physical-layer identification of UHF RFID tags , 2010, MobiCom.
[38] Harold H. Szu,et al. Novel identification of intercepted signals from unknown radio transmitters , 1995, Defense, Security, and Sensing.
[39] Ralph D. Hippenstiel,et al. Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.
[40] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[41] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[42] Michael A. Temple,et al. Improved wireless security for GMSK-based devices using RF fingerprinting , 2010, Int. J. Electron. Secur. Digit. Forensics.
[43] C. Frank. Most Secret War: British Scientific Intelligence 1939–1945 , 1978 .
[44] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[45] Michel Barbeau,et al. Radio Frequency Fingerprinting for Intrusion Detection in Wireless Networks , 2005 .
[46] Michael A. Temple,et al. Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.
[47] Michael A. Temple,et al. Augmenting Bit-Level Network Security Using Physical Layer RF-DNA Fingerprinting , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.