Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
WLAN Location Determination via Clustering and Probability Distributions
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study
IEEE Security and Privacy
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Security and Privacy
Using link RTT to passively detect unapproved wireless nodes
International Journal of Security and Networks
Secured fast link-layer handover protocols for 3G-WLAN interworking architecture
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
A sophisticated solution for revealing attacks on wireless LAN
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
The authors describe their Distributed Wireless Security Auditor (DWSA), which works toward finding unauthorized wireless access points in large-scale wireless environments while providing an autonomic and unobtrusive layer of network protection.