• Publications
  • Influence
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
TLDR
This paper demonstrates a novel approach, which incorporates radio frequency fingerprinting (RFF) into a wireless intrusion de tection system (IDS), for detecting this attack. Expand
WiMax/802.16 threat analysis
  • M. Barbeau
  • Computer Science
  • Q2SWinet '05
  • 13 October 2005
TLDR
This paper examines threats to the security of the WiMax/ 802.16 broadband wireless access technology. Expand
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
TLDR
This paper investigates a novel intrusion detection approach, which makes use of radio frequency fingerprinting (RFF) for profiling, Hotelling’s T 2 statistics for classification and a decision filter, for detecting these devices. Expand
DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE
TLDR
This paper presents a new algorithm that exploits the phase characteristics of signals for transient detection, which performs well with certain types of signals. Expand
Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method
TLDR
We propose two new algorithms for estimating the position of an uncooperative transmitter, based on the received signal strength (RSS) of a single target message at a set of receivers whose coordinates are known. Expand
Planning Control Rules for Reactive Agents
TLDR
We propose an incremental planner algorithm that generates a reactive plan by computing a sequence of partially satisfactory reactive plans converging to a completely satisfactory one. Expand
Radio frequency fingerprinting for intrusion detection in wirless networks
TLDR
Compounds having the formula in which R1 is lower alkyl or lower alkhyde, R2 is lower alkoxy or methylthio-substituted lower alkoxide, and R3 is R4 and R5 are loweralkyl, m is 1 or 2 and n is 0 or an integer from 1 to 4 have utility as insecticides and acaricides. Expand
A method for the synthesis of controllers to handle safety, liveness, and real-time constraints
TLDR
This paper describes a synthesis method that automatically derives controllers for timed discrete-event systems with nonterminating behavior modeled by timed transition graphs and specifications of control requirements expressed by metric temporal logic formulas. Expand
Principles of ad hoc networking
TLDR
Principles of Ad Hoc Networking presents a systematic introduction to the fundamentals of ad hoc networks, including the physical layer, medium access control, Bluetooth discovery and network formation, wireless network programming and protocols. Expand
Threats to Security in DSRC/WAVE
TLDR
We have identified some important threats to the security of DSRC/WAVE vehicular networks. Expand
...
1
2
3
4
5
...