Implementation of an intrusion detection system based on wireless positioning
暂无分享,去创建一个
David Akopian | Philip Chen | Maheedhar Gunturu | Phani K. Sagiraju | D. Akopian | P. Chen | P. Sagiraju | Maheedhar Gunturu
[1] V. Padmanabhan,et al. Enhancements to the RADAR User Location and Tracking System , 2000 .
[2] Glen Zorn,et al. Protected EAP Protocol (PEAP) Version 2 , 2004 .
[3] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[4] David Garlan,et al. Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..
[5] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[6] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[7] Simon Blake-Wilson,et al. EAP Tunneled TLS Authentication Protocol Version 1 (EAP-TTLSv1) , 2006 .
[8] Gaetano Borriello,et al. SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .