Intelligent jamming in wireless networks with applications to 802.11b and other networks
暂无分享,去创建一个
[1] Mithun Acharya,et al. Intelligent Jamming in 802 . 11 b Wireless Networks , 2004 .
[2] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[3] Joong Soo Ma,et al. Mobile Communications , 2003, Lecture Notes in Computer Science.
[4] Alberto Leon-Garcia,et al. Communication Networks , 2000 .
[5] Mithun Acharya,et al. Intelligent Jamming Attacks , Counterattacks and ( Counter ) 2 Attacks in 802 . 11 b Wireless Networks , 2005 .
[6] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[7] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[8] Rohit Negi,et al. DoS analysis of reservation based MAC protocols , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.