SecureAngle
- 20 October 2010
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- SAMPublished by Association for Computing Machinery (ACM) ,2009
- Detailed diagnosis in enterprise networksPublished by Association for Computing Machinery (ACM) ,2009
- Practical attacks against WEP and WPAPublished by Association for Computing Machinery (ACM) ,2009
- Geo-fencing: Confining Wi-Fi Coverage to Physical BoundariesPublished by Springer Nature ,2009
- Modulation rate adaptation in urban and vehicular environmentsPublished by Association for Computing Machinery (ACM) ,2008
- Towards highly reliable enterprise network services via inference of multi-level dependenciesPublished by Association for Computing Machinery (ACM) ,2007
- Detecting identity-based attacks in wireless networks using signalprintsPublished by Association for Computing Machinery (ACM) ,2006
- The final nail in WEP's coffinPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- RADAR: an in-building RF-based user location and tracking systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Robust frequency and timing synchronization for OFDMIEEE Transactions on Communications, 1997