Physically Locating Wireless Intruders
暂无分享,去创建一个
[1] Craig Ellison. Exploiting and protecting 802.11b wireless networks , 2002 .
[2] Alan V. Oppenheim,et al. Discrete-Time Signal Pro-cessing , 1989 .
[3] Joshua Wright. Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection , 2002 .
[4] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[5] A. Lee Swindlehurst,et al. A Performance Analysis ofSubspace-Based Methods in thePresence of Model Errors { Part I : The MUSIC AlgorithmA , 1992 .
[6] A. Lee Swindlehurst,et al. A Performance Analysis of Subspace-Based Methods in the Presence of Model Errors: Part &-Multidimensional Algorithms , 1993 .
[7] Robert Foust. Identifying and Tracking Unauthorized 802.11 Cards and Access Points , 2002, login Usenix Mag..
[8] Carla Marceau,et al. Characterizing the behavior of a program using multiple-length N-grams , 2001, NSPW '00.