The Evidence Collection of DoS Attack in WLAN by Using WLAN Forensic Profiling System
暂无分享,去创建一个
Jongin Lim | Okyeon Yi | Sun-Hee Lim | Seunghwan Yun | Donghyuk Yim | Jae-Yoon Lim | Okyeon Yi | Jongin Lim | Sun-Hee Lim | Donghyuk Yim | Jae-Yoon Lim | Seunghwan Yun
[1] A.H. Sung,et al. Identifying important features for intrusion detection using support vector machines and neural networks , 2003, 2003 Symposium on Applications and the Internet, 2003. Proceedings..
[2] Bo-Chao Cheng,et al. Quality Assurance for Evidence Collection in Network Forensics , 2006, WISA.
[3] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.
[4] Kamesh Namuduri,et al. Forensic Profiling System , 2005, IFIP Int. Conf. Digital Forensics.
[5] Jon Rigelsford,et al. 802.11 Wireless Networks: The Definitive Guide , 2003 .
[6] Anazida Zainal,et al. Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection , 2007, ICCSA.
[7] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[8] A. Nur Zincir-Heywood,et al. 802.11 network intrusion detection using genetic programming , 2005, GECCO '05.
[9] Karen A. Scarfone,et al. Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response , 2005 .
[10] Matthew S Gast. 802.11 Wireless Networks: The Definitive Guide, Second Edition , 2005 .