Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication
暂无分享,去创建一个
Raed A. Abd-Alhameed | Simon J. Shepherd | Fauzi Elmegri | Mohammed S. Bin-Melha | Issa T. E. Elfergani | Muhammad Adeka | Mohammad Ngala | E. Ibrahim | Ash S. Hussaini
[1] William C. Y. Lee. Mobile Cellular Telecommunications: Analog and Digital Systems , 1995 .
[2] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[3] Zhoujun Li,et al. Different approaches for the formal definition of authentication property , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).
[4] Sadayuki Abeta. Toward LTE commercial launch and future plan for LTE enhancements (LTE-Advanced) , 2010, 2010 IEEE International Conference on Communication Systems.
[5] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[6] Peng Ning,et al. Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Chang-Tien Lu,et al. Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[9] Michel Barbeau,et al. Rogue-base station detection in WiMax/802.16 wireless access networks , 2006, Ann. des Télécommunications.
[10] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[11] Issa M. Khalil,et al. UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks , 2010, Ad Hoc Networks.
[12] Xiaodong Wang,et al. Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.
[13] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[14] Ian F. Akyildiz,et al. The evolution to 4G cellular systems: LTE-Advanced , 2010, Phys. Commun..
[15] Jianping Hu,et al. A novel service-oriented AAA architecture , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[16] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[17] Stefan Parkvall,et al. Evolution of LTE toward IMT-advanced , 2011, IEEE Communications Magazine.
[18] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[19] Sanjay Kumar Madria,et al. Sybil attack detection in a hierarchical sensor network , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[20] Michel Barbeau,et al. Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.
[21] A.H. Sayed,et al. Network-based wireless location: challenges faced in developing techniques for accurate wireless location information , 2005, IEEE Signal Processing Magazine.
[22] Timothy A. Thomas,et al. LTE-advanced: next-generation wireless broadband technology [Invited Paper] , 2010, IEEE Wireless Communications.
[23] Radek Kuchta,et al. New Location-Based Authentication Techniques in the Access Management , 2010, 2010 6th International Conference on Wireless and Mobile Communications.
[24] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[25] Olav Tirkkonen,et al. LTE, the radio technology path towards 4G , 2010, Comput. Commun..
[26] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.