Map: a scalable monitoring system for dependable 802.11 wireless networks
暂无分享,去创建一个
Yong Sheng | Guanling Chen | Chris McDonald | Andrew T. Campbell | Tristan Henderson | David Kotz | Bennet Vance | Hongda Yin | Keren Tan | Udayan Deshpande | J. Wright | A. Campbell | D. Kotz | Guanling Chen | C. McDonald | Hongda Yin | Yong Sheng | Keren Tan | U. Deshpande | Joshua Wright | Bennet Vance | Tristan Henderson
[1] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[2] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[3] Mark Handley,et al. The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[4] Alec Wolman,et al. Enhancing the security of corporate Wi-Fi networks using DAIR , 2006, MobiSys '06.
[5] Stefan Savage,et al. Jigsaw: solving the puzzle of enterprise 802.11 analysis , 2006, SIGCOMM.
[6] Jie Wang,et al. Detecting protected layer-3 rogue APs , 2007, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07).
[7] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] U. Deshpande,et al. Channel Sampling Strategies for Monitoring Wireless Networks , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.
[9] Ratul Mahajan,et al. Analyzing the MAC-level behavior of wireless networks in the wild , 2006, SIGCOMM.
[10] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[11] Chris McDonald,et al. Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring , 2007, 2007 15th IEEE International Conference on Networks.
[12] Sergey Bratus,et al. Active behavioral fingerprinting of wireless devices , 2008, WiSec '08.
[13] Chris McDonald,et al. Refocusing in 802.11 Wireless Measurement , 2008, PAM.
[14] John C. Mitchell,et al. Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.