Security tests and attack experimentations of ProtoGENI
暂无分享,去创建一个
[1] Daisuke Takahashi,et al. IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..
[2] Yang Xiao,et al. Outlier detection based fault tolerant data aggregation for wireless sensor networks , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[3] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[4] Cliff Changchun Zou,et al. Wi-Fi access denial of service attack to smartphones , 2013, Int. J. Secur. Networks.
[5] Yang Xiao,et al. Network forensics analysis using Wireshark , 2015, Int. J. Secur. Networks.
[6] Yang Xiao,et al. Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..
[7] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[8] Wei Jiang,et al. Botnet: Survey and Case Study , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).
[9] Yi Pan,et al. Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs , 2006, Int. J. Wirel. Mob. Comput..
[10] Victor C. M. Leung,et al. Enhancing security using mobility-based anomaly detection in cellular mobile networks , 2006, IEEE Trans. Veh. Technol..
[11] Geoffrey G. Xie,et al. Fault Tolerance Experiments in 4D Future Internet Architecture , 2010 .
[12] Anat Bremler-Barr,et al. Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[13] Bo Fu,et al. A review of GENI authentication and access control mechanisms , 2013, Int. J. Secur. Networks.
[14] Bilal Khan,et al. Finding DDoS attack sources: Searchlight localization algorithm for network tomography , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[15] Bo Sun,et al. Integration of mobility and intrusion detection for wireless ad hoc networks: Research Articles , 2007 .
[16] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[17] Yang Xiao,et al. Attacks and countermeasures in multi-hop Cognitive Radio Networks , 2009, Int. J. Secur. Networks.
[18] Vijay Laxmi,et al. Sybil attack detection in VANET using neighbouring vehicles , 2014, Int. J. Secur. Networks.
[19] Jing Liu,et al. Internet of things' authentication and access control , 2012, Int. J. Secur. Networks.
[20] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[21] Ping Zhang,et al. A taxonomy of privilege escalation attacks in Android applications , 2014, Int. J. Secur. Networks.
[22] Yang Xiao,et al. Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks , 2007, Int. J. Wirel. Mob. Comput..
[23] Yang Xiao,et al. Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks , 2013, IEEE Systems Journal.
[24] Christopher W. Badenhop,et al. A black hole attack model using topology approximation for reactive ad-hoc routing protocols , 2014, Int. J. Secur. Networks.
[25] Yang Xiao,et al. Detection of Fraudulent Usage in Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.