On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
暂无分享,去创建一个
[1] Paramvir Bahl,et al. Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks , 2004, MobiCom '04.
[2] Ratul Mahajan,et al. CRAWDAD dataset uw/sigcomm2004 (v.2006-10-17) , 2006 .
[3] Alec Wolman,et al. Enhancing the security of corporate Wi-Fi networks using DAIR , 2006, MobiSys '06.
[4] Oscar Firschein,et al. Readings in computer vision: issues, problems, principles, and paradigms , 1987 .
[5] Donald F. Towsley,et al. Estimation and removal of clock skew from network delay measurements , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[6] John C. Mitchell,et al. Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.
[7] Erkki Oja,et al. Randomized hough transform (rht) : Basic mech-anisms, algorithms, and computational complexities , 1993 .
[8] Damon McCoy,et al. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.
[9] Darryl Veitch,et al. PC based precision timing without GPS , 2002, SIGMETRICS '02.
[10] Raheem A. Beyah,et al. Rogue access point detection using temporal traffic characteristics , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[11] David A. Cieslak,et al. RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning , 2008, TSEC.
[12] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[13] Marco Cesati,et al. Understanding the Linux Kernel, Third Edition , 2005 .
[14] Dana H. Ballard,et al. Generalizing the Hough transform to detect arbitrary shapes , 1981, Pattern Recognit..
[15] Steven J. Murdoch,et al. Hot or not: revealing hidden services by their clock skew , 2006, CCS '06.
[16] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[17] Donald F. Towsley,et al. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs , 2007, IMC '07.
[18] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).