Wireless Network Security Detection System Design Based on Client
暂无分享,去创建一个
[1] Chuan Heng Foh,et al. Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters , 2005, IEEE Communications Letters.
[2] Mihail L. Sichitiu,et al. IEEE 802.11 Saturation Throughput Analysis in the Presence of Hidden Terminals , 2012, IEEE/ACM Transactions on Networking.
[3] Zeng Ying. Intrusion Detection in Wireless Ad Hoc Network , 2005 .
[4] Dongwon Kim,et al. Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks , 2010, IEEE Communications Letters.
[5] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..