Detecting and Localizing Wireless Spoofing Attacks.
Yingying ChenWade TrappeRichard P. MartinPublished in: SECON (2007)
Keyphrases
- wireless communication
- network intrusion detection systems
- wireless networks
- detecting malicious
- traffic analysis
- ddos attacks
- mobile devices
- malicious attacks
- identity theft
- malicious activities
- countermeasures
- cellular networks
- security protocols
- mobile networks
- network intrusion
- misuse detection
- detect malicious
- terrorist attacks
- security risks
- computer security
- mobile ad hoc networks
- watermarking algorithm
- watermarking scheme
- anomaly detection
- computer simulation