malnets: large‐scale malicious networks via compromised wireless access points
- 24 September 2009
- journal article
- research article
- Published by Wiley in Security and Communication Networks
- Vol. 3 (2-3) , 102-113
- https://doi.org/10.1002/sec.149
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Breaking 104 Bit WEP in Less Than 60 SecondsPublished by Springer Nature ,2007
- Origin authentication in interdomain routingComputer Networks, 2006
- The Blaster Worm: Then and NowIEEE Security & Privacy, 2005
- Inside the Slammer wormIEEE Security & Privacy, 2003
- Security flaws in 802.11 data link protocolsCommunications of the ACM, 2003
- The Structure and Function of Complex NetworksSIAM Review, 2003
- On power-law relationships of the Internet topologyACM SIGCOMM Computer Communication Review, 1999
- The indoor radio propagation channelProceedings of the IEEE, 1993
- DIRECTED-GRAPH EPIDEMIOLOGICAL MODELS OF COMPUTER VIRUSESPublished by World Scientific Pub Co Pte Ltd ,1992
- Review on radio propagation into and within buildingsIEE Proceedings H Microwaves, Antennas and Propagation, 1991