A data fusion technique to detect wireless network virtual jamming attacks
暂无分享,去创建一个
Konstantinos G. Kyriakopoulos | Diego Santoro | Francisco J. Aparicio-Navarro | David J. Parish | Michele Vadursi | Ginés Escudero-Andreu
[1] Andrea Bondavalli,et al. A methodology and supporting techniques for the quantitative assessment of insider threats , 2013, DISCCO '13.
[2] Antonio Pescapè,et al. Early Classification of Network Traffic through Multi-classification , 2011, TMA.
[3] A. Y. Dak,et al. A novel framework for jamming detection and classification in wireless networks , 2012, 2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC).
[4] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[5] Alexander M. Wyglinski,et al. A combined approach for distinguishing different types of jamming attacks against wireless networks , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[6] Andrea Bondavalli,et al. Insider Threat Assessment: a Model-Based Methodology , 2014, OPSR.
[7] Deborah A. Frincke,et al. Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory , 2005, ACM-SE 43.
[8] 栄 久米原,et al. Wiresharkパケット解析リファレンス : Network Protocol Analyzer , 2009 .
[9] Pramod K. Varshney,et al. Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming , 2003 .
[10] Carey L. Williamson,et al. Ambient Interference Effects in Wi-Fi Networks , 2010, Networking.
[11] M. Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).
[12] Konstantinos G. Kyriakopoulos,et al. A multi-layer data fusion system for Wi-Fi attack detection using automatic belief assignment , 2012, World Congress on Internet Security (WorldCIS-2012).
[13] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[14] Alexandros G. Fragkiadakis,et al. Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection , 2015, Wirel. Commun. Mob. Comput..
[15] Andrea Bondavalli,et al. Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform , 2015, PASM.
[16] Geethapriya Thamilarasu,et al. A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.