WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES
暂无分享,去创建一个
[1] Chao Yang,et al. Who is peeping at your passwords at Starbucks? — To catch an evil twin access point , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[2] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[3] Sanjay Kumar Jena,et al. Security in Bluetooth, RFID and wireless sensor networks , 2011, ICCCS '11.
[4] Andrew Vladimirov,et al. Wi-Foo: The Secrets of Wireless Hacking , 2004 .
[5] Noora Al Mutawa,et al. Forensics and war-driving on unsecured wireless network , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[6] Saurabh Dey,et al. The sneeze algorithm: A social network & biomimetic approach for intrusion detection in wireless networks , 2010, 2010 IEEE International Workshop on: Business Applications of Social Network Analysis (BASNA).
[7] Mazdak Zamani,et al. A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[8] Hong Huang,et al. On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network , 2011, IEEE Transactions on Wireless Communications.
[9] Xiaohong Yuan,et al. Cloud computing and security challenges , 2012, ACM-SE '12.
[10] Kun Yang,et al. A Random Packet Destruction DoS Attack for Wireless Networks , 2008, 2008 IEEE International Conference on Communications.
[11] Kai Cui,et al. A research into the latent danger of WLAN , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).
[12] Guangzhi Qu,et al. RAPiD: An indirect rogue access points detection system , 2010, International Performance Computing and Communications Conference.
[13] Radha Gulati. The Threat of Social Engineering and Your Defense Against It , 2003 .
[14] Adrian Hannah. Packet sniffing basics , 2011 .
[15] Amit Dvir,et al. A joint framework of passive monitoring system for complex wireless networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[16] Phivos Mylonas,et al. Real-Life Paradigms of Wireless Network Security Attacks , 2011, 2011 15th Panhellenic Conference on Informatics.
[17] Li Hui,et al. Mobile jamming attack in clustering wireless sensor network , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[18] Ajaz Hussain Mir,et al. Quantification of the Effect of Security on Performance in Wireless LANs , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[19] Loukas Lazos,et al. Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.
[20] S Vinjosh Reddy,et al. Wireless hacking - a WiFi hack by cracking WEP , 2010, 2010 2nd International Conference on Education Technology and Computer.