Analysis of Detection of Multiple Attackers in Wireless Networks
暂无分享,去创建一个
[1] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[2] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[3] Richard P. Martin,et al. Empirical Evaluation of the Limits on Localization Using Signal Strength , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[4] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[5] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[6] Santosh Pandey,et al. A survey on localization techniques for wireless networks , 2006 .
[7] Jon Crowcroft,et al. Delivery Properties of Human Social Networks , 2009, IEEE INFOCOM 2009.
[8] Jie Yang,et al. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks , 2009, IEEE INFOCOM 2009.
[9] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[10] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[11] Jie Zheng,et al. Estimating the Number of Clusters via System Evolution for Cluster Analysis of Gene Expression Data , 2009, IEEE Transactions on Information Technology in Biomedicine.
[12] P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis , 1987 .
[13] Richard P. Martin,et al. A Practical Approach to Landmark Deployment for Indoor Localization , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[14] Tzi-cker Chiueh,et al. Sequence Number-Based MAC Address Spoof Detection , 2005, RAID.
[15] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[16] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[17] Douglas C. Madory,et al. New Methods of Spoof Detection in 802.11b Wireless Networking , 2006 .
[18] Jie Wu,et al. Secure and Efficient Key Management in Mobile Ad Hoc Networks , 2005, IPDPS.