Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-based Access Point
暂无分享,去创建一个
[1] Neeraj Mittal,et al. A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.
[2] Wen-Nung Tsai,et al. Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks , 2009, J. Inf. Sci. Eng..
[3] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[4] Ivan Martinovic,et al. Wireless client puzzles in IEEE 802.11 networks: security by wireless , 2008, WiSec '08.
[5] A. Nur Zincir-Heywood,et al. 802.11 De-authentication Attack Detection Using Genetic Programming , 2006, EuroGP.
[6] Lan,et al. A Comparative Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless , 2011 .
[7] James T. Yu,et al. An Analysis of DoS Attacks on Wireless LAN , 2006, Wireless and Optical Communications.
[8] James Yu,et al. A Solution to WLAN Authentication and Association DoS Attacks , 2007 .
[9] Bülent Tavli,et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.
[10] Dinh-Thuc Nguyen,et al. A SOLUTION FOR DEFENDING AGAINST DENIAL OF SERVICE ATTACK ON WIRELESS LAN , 2008 .
[11] James T. Yu,et al. Rogue Access Point Based DoS Attacks against 802.11 WLANs , 2008, 2008 Fourth Advanced International Conference on Telecommunications.
[12] John Mourjopoulos,et al. Wireless Digital Audio Delivery Analysis and Evaluation , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[13] Shukor Abd Razak,et al. Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure , 2015 .
[14] Ping Ding,et al. Security algorithms to prevent Denial of Service ( DoS ) attacks in WLAN , 2013 .
[15] Gregory B. Brewster,et al. Empirical studies and queuing modeling of denial of service attacks against 802.11 WLANs , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[16] Chee‐Hock Ng,et al. Queueing Modelling Fundamentals , 1996 .
[17] Alexandros G. Fragkiadakis,et al. Denial-of-Service Attacks in Wireless Networks Using Off-the-Shelf Hardware , 2014, HCI.
[18] Lachlan L. H. Andrew,et al. Active Queue Management for Fair Resource Allocation in Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[19] Md. Sadekur Rahman,et al. An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network , 2015 .