Wireless Network Security: An Overview

[1]  Gongjun Yan,et al.  Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention Window Size , 2011, IEEE Transactions on Parallel and Distributed Systems.

[2]  William C. Y. Lee Wireless and Cellular Communications , 2005 .

[3]  Scott D. Lathrop,et al.  Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[4]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[5]  Bruce Potter,et al.  Wireless Security's Future , 2003, IEEE Secur. Priv..

[6]  Deepak Pareek WiMAX: Taking Wireless to the MAX , 2006 .

[7]  Chris Hurley,et al.  WarDriving: Drive, Detect, Defend: A Guide to Wireless Security , 2004 .

[8]  Peng Liu,et al.  EndSec: An end-to-end message security protocol for mobile telecommunication networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[9]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[10]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[11]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[12]  Steve Mann,et al.  The Wireless Application Protocol : A Wiley Tech Brief , 2000 .

[13]  Aaron Earle Wireless Security Handbook , 2005 .

[14]  Stefan Savage,et al.  Inside the Slammer Worm , 2003, IEEE Secur. Priv..

[15]  Ata Elahi,et al.  ZigBee Wireless Sensor and Control Network , 2009 .

[16]  Gustavo Carneiro,et al.  Cross-layer design in 4G wireless terminals , 2004, IEEE Wireless Communications.

[17]  W.A. Arbaugh Wireless Security Is Different , 2003, Computer.

[18]  Tyler Moore,et al.  Signaling system 7 (SS7) network security , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..

[19]  Gongjun Yan,et al.  Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.