Efficacy of physical layer preamble manipulation for IEEE 802.11a/ac
暂无分享,去创建一个
Christopher W. Badenhop | Jonathan D. Fuller | Benjamin W. P. Ramsey | Benjamin W. Ramsey | J. Fuller
[1] Benjamin W. P. Ramsey,et al. Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks , 2013, Critical Infrastructure Protection.
[2] Kian Meng Yap,et al. Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance , 2013, IEEE Wireless Communications Letters.
[3] Mojtaba Aajami,et al. Optimal TXOP Sharing in IEEE 802.11ac , 2015, IEEE Communications Letters.
[4] Douglas J. Leith,et al. Proportional Fair MU-MIMO in 802.11 WLANs , 2014, IEEE Wireless Communications Letters.
[5] Benjamin W. P. Ramsey,et al. Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation , 2015, IEEE Transactions on Dependable and Secure Computing.
[6] Sergey Bratus,et al. Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion , 2014, WiSec '14.