Compromising industrial facilities from 40 miles away, presented at the Black Hat USA Conference, 2013. ,
A black hole attack model using topology approximation for reactive ad-hoc routing protocols, International Journal of Security and Networks, vol.9, issue.2, pp.63-77, 2014. ,
DOI : 10.1504/IJSN.2014.060755
All quiet on the wireless front, Control Global, Schaumburg , Illinois (www.controlglobal.com/articles, 2011. ,
ZigBee Device Verification for Securing Industrial Control and Building Automation Systems, Critical Infrastructure Protection VII, pp.47-62, 2013. ,
DOI : 10.1007/978-3-642-45330-4_4
URL : https://hal.archives-ouvertes.fr/hal-01456892
Security evaluation of the Z-Wave wireless protocol, presented at the Black Hat USA Conference, 2013. ,
Application Development Guide, Document Number: BSADG Rev, 2008. ,
Converting Radio Signals to Data Packets: Examination of Using GNU Radio Companion for Security Research and Assessment, p.2014 ,
Optimal jamming attack strategies and network defense policies in wireless sensor networks, IEEE Transactions on Mobile Computing, vol.9, issue.8, pp.1119-1133, 2010. ,
Robust wireless infrastructure against jamming attacks, in Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, pp.123-145, 2012. ,
Denial of Service Attacks in Wireless Networks: The Case of Jammers, IEEE Communications Surveys & Tutorials, vol.13, issue.2, pp.245-257, 2011. ,
DOI : 10.1109/SURV.2011.041110.00022
Bringing software defined radio to the penetration testing community, presented at the Black Hat USA Conference, 2014. ,
Defensive rekeying strategies for physical-layermonitored low-rate wireless personal area networks, pp.63-79, 2013. ,
DOI : 10.1007/978-3-642-45330-4_5
Watching for Weakness in Wild WPANs, MILCOM 2013, 2013 IEEE Military Communications Conference, pp.1404-1409, 2013. ,
DOI : 10.1109/MILCOM.2013.238
Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers, International Journal of Critical Infrastructure Protection, vol.8, pp.27-39, 2015. ,
DOI : 10.1016/j.ijcip.2014.11.002
URL : http://dx.doi.org/10.1016/j.ijcip.2014.11.002
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems, International Journal of Critical Infrastructure Protection, vol.5, issue.3-4, pp.154-174, 2012. ,
DOI : 10.1016/j.ijcip.2012.10.001
Potentials and limitations of WIFI-positioning using Time-of-Flight, International Conference on Indoor Positioning and Indoor Navigation, 2013. ,
DOI : 10.1109/IPIN.2013.6817861
Wave Products, Fremont, California (z-wave.sigma designs, p.2015 ,
Detection of reactive jamming in sensor networks, ACM Transactions on Sensor Networks, vol.7, issue.2, 2010. ,
DOI : 10.1145/1824766.1824772
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations, ACM Transactions on Information and System Security, vol.13, issue.4, 2010. ,
DOI : 10.1145/1880022.1880029
The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, pp.46-57, 2005. ,
DOI : 10.1145/1062689.1062697
Document No. DSH10756, version 6, Fremont, California (media.digikey.com/pdf, 2007. ,