Using Spectral Fingerprints to Improve Wireless Network Security
暂无分享,去创建一个
Robert F. Mills | Michael A. Temple | William C. Suski | Michael J. Mendenhall | M. Mendenhall | M. Temple | R. Mills
[1] O. Ureten,et al. Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .
[2] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[3] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[4] J. Dudczyk,et al. Applying the radiated emission to the specific emitter identification , 2004, 15th International Conference on Microwaves, Radar and Wireless Communications (IEEE Cat. No.04EX824).
[5] O. Ureten,et al. Generalised dimension characterisation of radio transmitter turn-on transients , 2000 .
[6] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[7] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[8] R.T. Johnk,et al. Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[9] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] J. Dudczyk,et al. Mixed Method Based on Intrapulse Data and Radiated Emission to Emitter Sources Recognition , 2006, 2006 International Conference on Microwaves, Radar & Wireless Communications.
[11] L. E. Langley,et al. Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.
[12] John G. Proakis,et al. Digital Communications , 1983 .