Short paper, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, WiSec '14, 2014. ,
DOI : 10.1145/2627393.2627399
URL : https://hal.archives-ouvertes.fr/hal-00997716
I know your MAC address: targeted tracking of individual using Wi-Fi, Journal of Computer Virology and Hacking Techniques, vol.10, issue.4, pp.1-9, 2013. ,
DOI : 10.1007/s11416-013-0196-1
URL : https://hal.archives-ouvertes.fr/hal-00858324
I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp.1-9, 2012. ,
DOI : 10.1109/WoWMoM.2012.6263700
URL : https://hal.archives-ouvertes.fr/hal-00747825
Brand Data Gathering From Live Social Media Streams, Proceedings of International Conference on Multimedia Retrieval, ICMR '14, pp.169-169, 2014. ,
DOI : 10.1145/2578726.2578748
Can Ferris Bueller still have his day off? protecting privacy in the wireless era, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp.1-10, 2007. ,
SnapMe if you can, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, pp.95-106, 2013. ,
DOI : 10.1145/2462096.2462113
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294 ,
DOI : 10.1145/2426656.2426685
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.423.2431
IdentityLink, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14 Adjunct, 2014. ,
DOI : 10.1145/2632048.2636072
A survey on localization techniques for wireless networks, Journal of the Chinese Institute of Engineers, vol.2, issue.7, pp.1125-1148, 2006. ,
DOI : 10.1109/98.626982
Detection of Promiscuous Nodes Using ARP Packets. A white paper from http://www.securityfriday.com Accessed, 2002. ,
Deanonymizing mobility traces, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382262
Attacks on public WLAN-based positioning systems, Proceedings of the 7th international conference on Mobile systems, applications, and services, Mobisys '09, pp.29-40, 2009. ,
DOI : 10.1145/1555816.1555820
Advanced Wi-Fi attacks using commodity hardware, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, pp.256-265, 2014. ,
DOI : 10.1145/2664243.2664260
Locating in fingerprint space, Proceedings of the 18th annual international conference on Mobile computing and networking, Mobicom '12, pp.269-280, 2012. ,
DOI : 10.1145/2348543.2348578