Wireless Protocol Secure Injection Testing Method Based on Time Selection
暂无分享,去创建一个
[1] Nuno Neves,et al. Using Attack Injection on Closed Protocols , 2010 .
[2] Yang Yi-xian. Analysis of Wireless RF Injection on Physical Layer , 2009 .
[3] Neeli R. Prasad,et al. Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks , 2010 .
[4] Michael Roche. Wireless Hacking Tools , 2007 .
[5] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[6] Stephen B. Wicker,et al. Transactional Confidentiality in Sensor Networks , 2008, IEEE Security & Privacy.
[7] Neeli R. Prasad,et al. Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices , 2010, Comput. J..