Using DE-Optimized LFS Processing to Enhance 4G Communication Security
暂无分享,去创建一个
[1] Michael A. Temple,et al. Improving Intra-Cellular Security Using Air Monitoring with RF Fingerprints , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[2] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[3] Jennifer C. Hou,et al. Proceedings of the 13th annual ACM international conference on Mobile computing and networking , 2007, MobiCom 2007.
[4] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[5] Robert A. Lordo,et al. Learning from Data: Concepts, Theory, and Methods , 2001, Technometrics.
[6] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[7] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[8] Thomas D. Tarman,et al. Intrusion detection considerations for switched networks , 2001, SPIE Optics East.
[9] Sheldon A. Munns,et al. RF-DNA Fingerprinting for Airport WiMax Communications Security , 2010, 2010 Fourth International Conference on Network and System Security.
[10] Srdjan Capkun,et al. Physical-layer identification of UHF RFID tags , 2010, MobiCom.
[11] Robert E. Uhrig,et al. Learning from data with localized regression and differential evolution , 2003 .
[12] Michael A. Temple,et al. Using differential evolution to optimize 'learning from signals' and enhance network security , 2011, GECCO '11.
[13] D. Ruppert. The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .
[14] Witold Kinsner,et al. A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.
[15] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[16] Michael A. Temple,et al. Improved wireless security for GMSK-based devices using RF fingerprinting , 2010, Int. J. Electron. Secur. Digit. Forensics.
[17] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[18] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[19] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[20] Michael A. Temple,et al. Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.
[21] Vladimir Cherkassky,et al. Learning from Data: Concepts, Theory, and Methods , 1998 .
[22] Robert F. Mills,et al. Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.
[23] R. Storn,et al. Differential Evolution: A Practical Approach to Global Optimization (Natural Computing Series) , 2005 .
[24] Michael A. Temple,et al. Augmenting Bit-Level Network Security Using Physical Layer RF-DNA Fingerprinting , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[25] Andrei V. Gribok,et al. APPLICATION OF LOCALIZED REGULARIZATION METHODS FOR NUCLEAR POWER PLANT SENSOR CALIBRATION MONITORING , 2002 .
[26] Daisuke Takahashi,et al. IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..
[27] David G. Stork,et al. Pattern Classification , 1973 .