Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
暂无分享,去创建一个
[1] Srinivasan Seshan,et al. Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM '07.
[2] David R. Cheriton,et al. DoS and authentication in wireless public access networks , 2002, WiSE '02.
[3] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[4] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[5] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[6] Joshua Wright,et al. Detecting Wireless LAN MAC Address Spoofing , 2003 .
[7] Ivan Martinovic,et al. Wireless client puzzles in IEEE 802.11 networks: security by wireless , 2008, WiSec '08.
[8] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[9] John C. Mitchell,et al. Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.
[10] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[11] Takeshi Kato,et al. TDOA location system for IEEE 802.11b WLAN , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[12] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[13] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[14] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[15] Kevin C. Almeroth,et al. Malware in IEEE 802.11 Wireless Networks , 2008, PAM.
[16] Adrian Perrig,et al. Proceedings of the 2nd ACM workshop on Wireless security , 2003 .
[17] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.
[18] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[19] Tzi-cker Chiueh,et al. Sequence Number-Based MAC Address Spoof Detection , 2005, RAID.