A Novel Approach for Rogue Access Point Detection on the Client-Side
暂无分享,去创建一个
Mazdak Zamani | Azizah Bt Abdul Manaf | Maziar Janbeglou | Somayeh Nikbakhsh | M. Zamani | A. Manaf | M. Janbeglou | S. Nikbakhsh
[1] Alec Wolman,et al. Enhancing the security of corporate Wi-Fi networks using DAIR , 2006, MobiSys '06.
[2] D. Woolley. The White Paper. , 1972, British medical journal.
[3] Tim Kindberg,et al. Authenticating Public Wireless Networks with Physical Evidence , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[4] Bo Sheng,et al. A Measurement Based Rogue AP Detection Scheme , 2009, IEEE INFOCOM 2009.
[5] Chao Yang,et al. Who is peeping at your passwords at Starbucks? — To catch an evil twin access point , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[6] Raheem A. Beyah,et al. Rogue access point detection using temporal traffic characteristics , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[7] Raheem A. Beyah,et al. A Passive Approach to Rogue Access Point Detection , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[8] Guangzhi Qu,et al. RAPiD: An indirect rogue access points detection system , 2010, International Performance Computing and Communications Conference.
[9] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[10] I-En Liao,et al. Detecting rogue access points using client-side bottleneck bandwidth analysis , 2009, Comput. Secur..
[11] Volker Roth,et al. Simple and effective defense against evil twin access points , 2008, WiSec '08.
[12] Min Song,et al. A Hidden Markov Model based approach to detect Rogue Access Points , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[13] Donald F. Towsley,et al. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs , 2007, IMC '07.