Detecting Impersonation Attacks in Future Wireless and Mobile Networks
暂无分享,去创建一个
[1] M. Riezenman. Cellular security: better, but foes still lurk , 2000 .
[2] R. Filjar,et al. Architecture of the automatic position reporting system (APRS) , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.
[3] Michel Barbeau,et al. Perfect identity concealment in UMTS over radio access links , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[4] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[5] George L. Lyberopoulos,et al. Evaluation of location area planning scenarios in future mobile telecommunication systems , 1995, Wirel. Networks.
[6] N. Serinken,et al. Characteristics of radio transmitter fingerprints , 2001 .
[7] Bernard Aboba,et al. Extensible Authentication Protocol (EAP) , 2004, RFC.
[8] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[9] Ansi Ieee,et al. Part11 : Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .
[10] Michel Barbeau,et al. Using Mobility Profiles for Anomaly-based Intrusion Detection in Mobile Networks , 2005 .
[11] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[12] J. Spencer. Use of an artificial neural network to detect anomalies in wireless device location for the purpose of intrusion detection , 2005, Proceedings. IEEE SoutheastCon, 2005..
[13] W. Kinsner,et al. Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.
[14] O. H. Tekbas,et al. Improvement of transmitter identification system for low SNR transients , 2004 .
[15] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[16] Nokia,et al. Network Working Group Extensible Authentication Protocol Method for Gsm Subscriber Identity Modules (eap-sim) , 2004 .
[17] Golden G. Richard,et al. Physically Locating Wireless Intruders , 2004, ITCC.
[18] Oktay Üreten,et al. Bayesian detection of radio transmitter turn-on transients , 1999, NSIP.
[19] Yuguang Fang,et al. A new location management strategy based on user mobility pattern for wireless networks , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..
[20] Victor C. M. Leung,et al. Location management for next-generation personal communications networks , 2000, IEEE Netw..
[21] Alicia Laing. The Security Mechanism for IEEE 802.11 Wireless Networks , 2001 .
[22] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[23] Andrew Hunter,et al. Feature Selection Using Probabilistic Neural Networks , 2000, Neural Computing & Applications.
[24] Janelle J. Harms,et al. Profile-based protocols in wireless mobile ad hoc networks , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.
[25] Refik Molva,et al. IDAMN: An Intrusion Detection Architecture for Mobile Networks , 1997, IEEE J. Sel. Areas Commun..
[26] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[27] Henry Haverinen,et al. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.
[28] Ieee Microwave Theory,et al. Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems — Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands , 2003 .
[29] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[30] O. Ureten,et al. Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .
[31] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.