GNSS Receiver Identification Using Clock-Derived Metrics †
暂无分享,去创建一个
[1] Chao Shen,et al. Passive fingerprinting for wireless devices: A multi-level decision approach , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[2] Pablo Padilla,et al. Radiofrequency identification of wireless devices based on RF fingerprinting , 2013 .
[3] Vimal K. Khanna,et al. Remote fingerprinting of mobile phones , 2015, IEEE Wireless Communications.
[4] Dario Tarchi,et al. Radiolocation and tracking of automatic identification system signals for maritime situational awareness , 2015 .
[5] Rashid Rashidzadeh,et al. Wireless device identification using oscillator control voltage as RF fingerprint , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[6] Yan Xu,et al. GPS: Theory, Algorithms and Applications , 2003 .
[7] Gérard Lachapelle,et al. GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .
[8] Raheem Beyah,et al. GTID: A Technique for Physical Device and Device Type Fingerprinting , 2015, IEEE Transactions on Dependable and Secure Computing.
[9] Thomas Pany,et al. Known Vulnerabilities of Global Navigation Satellite Systems, Status, and Potential Mitigation Techniques , 2016, Proceedings of the IEEE.
[10] Walid Saad,et al. Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.
[11] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[12] Stefano Bregni,et al. Synchronization of Digital Telecommunications Networks , 2002 .
[13] D. W. Allan,et al. Statistics of atomic frequency standards , 1966 .
[14] Benjamin W. P. Ramsey,et al. An RF-DNA verification process for ZigBee networks , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[15] Todd E. Humphreys,et al. GNSS Spoofing and Detection , 2016, Proceedings of the IEEE.
[16] Riccardo Scopigno,et al. Exploring TV white spaces for the mitigation of AIS weaknesses , 2015, 2015 IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT).
[17] Ferat Sahin,et al. A survey on feature selection methods , 2014, Comput. Electr. Eng..
[18] Claudio Gentile,et al. Identification of Mobile Phones Using the Built-In Magnetometers Stimulated by Motion Patterns , 2017, Sensors.
[19] Daniele Borio,et al. GNSS Receiver Fingerprinting for Security-Enhanced Applications , 2016 .
[20] Vincent Rijmen,et al. A Navigation Message Authentication Proposal for the Galileo Open Service , 2016 .
[21] M. Narasimha Murty,et al. Pattern Recognition - An Algorithmic Approach , 2011, Undergraduate Topics in Computer Science.
[22] Stefano Bregni. Measurement of maximum time interval error for telecommunications clock stability characterization , 1996 .
[23] Gary Steri,et al. Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS) , 2016, Sensors.
[24] Sheldon A. Munns,et al. RF-DNA Fingerprinting for Airport WiMax Communications Security , 2010, 2010 Fourth International Conference on Network and System Security.
[25] Swati Sharma,et al. Experience with heterogenous clock-skew based device fingerprinting , 2012, LASER '12.
[26] Dennis Goeckel,et al. Wireless Device Identification Based on RF Oscillator Imperfections , 2014, IEEE Transactions on Information Forensics and Security.
[27] Andreas Zinnen,et al. Clock skew based remote device fingerprinting demystified , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[28] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[29] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).