Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks
暂无分享,去创建一个
[1] Κουκουβακης Ε. Γεωργιος. Σχεδιασμος Και Υλοποιηση Μοντελου Εξομοιωσης Υπερκειμενων Δικτυων Με Χρηση Του Εργαλειου Network Simulator 2 , 2003 .
[2] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[3] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[4] John S. Baras,et al. A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.
[5] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[6] Rohit Negi,et al. DoS analysis of reservation based MAC protocols , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[7] Mithun Acharya,et al. Intelligent Jamming in 802 . 11 b Wireless Networks , 2004 .
[8] F. A. Seiler,et al. Numerical Recipes in C: The Art of Scientific Computing , 1989 .
[9] Harry J. Khamis,et al. The two-stage i -corrected Kolmogorov-Smirnov test , 2000 .
[10] Xiaodong Wang,et al. Batch and Sequential Bayesian Estimators of the Number of Active Terminals in an IEEE 802.11 Network , 2007, IEEE Transactions on Signal Processing.
[11] J. Baras,et al. Incentive compatible medium access control in wireless networks , 2006, GameNets '06.
[12] Stephen B. Wicker,et al. Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..
[13] William H. Press,et al. The Art of Scientific Computing Second Edition , 1998 .
[14] Xiaodong Wang,et al. Adaptive Optimization of IEEE 802.11 DCF Based on Bayesian Estimation of the Number of Competing Terminals , 2006, IEEE Transactions on Mobile Computing.
[15] F. Massey. The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .
[16] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[17] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[18] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.
[19] Stephen B. Wicker,et al. Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] B. Issac,et al. DoS attacks and defense mechanisms in wireless networks , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.
[21] Bo Li,et al. A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF , 2004, IEEE Trans. Veh. Technol..
[22] Ilenia Tinnirello,et al. Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] Robert B. Ash,et al. Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.
[24] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[25] M. Hall,et al. Effect of pulse jamming on IEEE 802.11 wireless LAN performance , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[26] William H. Press,et al. Book-Review - Numerical Recipes in Pascal - the Art of Scientific Computing , 1989 .
[27] David J. Thuente,et al. Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .
[28] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[29] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[30] Xiaodong Wang,et al. Detecting MAC Layer Collision Abnormalities in CSMA/CA Wireless Networks , 2008, 2008 IEEE International Conference on Communications.
[31] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[32] Mithun Acharya,et al. Intelligent Jamming Attacks , Counterattacks and ( Counter ) 2 Attacks in 802 . 11 b Wireless Networks , 2005 .
[33] Harry J. Khamis,et al. The δ-corrected Kolmogorov-Smirnov test for goodness of fit , 1990 .