Detection and analysis of the Chameleon WiFi access point virus
暂无分享,去创建一个
[1] Zhiqi Tao,et al. X-Mode: A Real Time Approach of Discriminating Wi-Fi Network Impersonators , 2008, 2008 4th International Conference on Next Generation Web Services Practices.
[2] Xiuzhen Cheng,et al. A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[3] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[4] Dijiang Huang,et al. Using Power Hopping to Counter MAC Spoof Attacks in WLAN , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[5] Alessandro Vespignani,et al. WiFi networks and malware epidemiology , 2007, Proceedings of the National Academy of Sciences.
[6] Steven Myers,et al. Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm , 2011, LEET.
[7] Min Song,et al. A Hidden Markov Model based approach to detect Rogue Access Points , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[8] Kian Meng Yap,et al. Development of device identity using WiFi layer 2 management frames for combating Rogue APs , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[9] Eitan Altman,et al. Maximum Damage Malware Attack in Mobile Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Mazdak Zamani,et al. A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.