Selfish attacks in IEEE 802.11aa networks with intra-AC prioritization
暂无分享,去创建一个
[1] Szymon Szott,et al. Impact of Misbehaviour on QoS in Wireless Mesh Networks , 2009, Networking.
[2] Szymon Szott,et al. What's new for QoS in IEEE 802.11? , 2013, IEEE Network.
[3] Virtual Bridged,et al. IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).
[4] Katarzyna Kosek-Szott. A Throughput Model of IEEE 802.11aa Intra-Access Category Prioritization , 2013, Wirel. Pers. Commun..
[5] Antonio de la Oliva,et al. Performance evaluation of the IEEE 802.11aa multicast mechanisms for video streaming , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[6] Szymon Szott,et al. An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes , 2010, EURASIP J. Wirel. Commun. Netw..
[7] Ilenia Tinnirello,et al. Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[8] Jose Miguel Villalón Millán,et al. Evaluation of the IEEE 802.11aa group addressed service for robust audio-video streaming , 2012, 2012 IEEE International Conference on Communications (ICC).
[9] Marek Natkaniec,et al. IEEE 802.11aa intra-AC prioritization - A new method of increasing the granularity of traffic prioritization in WLANs , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[10] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[11] Szymon Szott. Selfish insider attacks in IEEE 802.11s wireless mesh networks , 2014, IEEE Communications Magazine.
[12] Marek Natkaniec,et al. A novel IEEE 802.11aa intra-AC prioritization method for video transmissions , 2014, 2014 IEEE Global Communications Conference.
[13] Szymon Szott,et al. Detecting backoff misbehaviour in IEEE 802.11 EDCA , 2011, Eur. Trans. Telecommun..
[14] Ilenia Tinnirello,et al. Wireless MAC processors: Programming MAC protocols on commodity Hardware , 2012, 2012 Proceedings IEEE INFOCOM.
[15] Szymon Szott,et al. The risks of WiFi flexibility: Enabling and detecting cheating , 2013, 2013 Future Network & Mobile Summit.
[16] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[17] Szymon Szott,et al. Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks , 2014, IEEE Transactions on Wireless Communications.