An Improved Method of Detecting Spoofed Attack in Wireless LAN,1 st International NETCOM, pp.104-108, 2009. ,
Discover how using the IEEE standards approach plugs vulnerabilities and thwarts attacks.http://software.intel.com/en-us/articles/secure- management-of-ieee-80211-wireless-lans, 2008. ,
Access points vulnerabilities to DoS attacks in 802, Wireless Networks, vol.11, issue.142, pp.159-169, 2008. ,
VoIP over WLAN 802.11b simulations for infrastructure and adhoc networks, Proceedings LCS 2006, pp.61-64, 2006. ,
Wireless network security, 802.11, bluetooth and handheld devices: recommendations of the national institute of standards and technology, NIST Special Publication 800-48, 2002. ,
Denial-of-Service attacks and countermeasures in IEEE 802, 11 wireless networks, Computer Standards and Interfaces, pp.931-941, 2009. ,
Non-cryptographic methods of MAC spoof detection in wireless LAN, 2008 16th IEEE International Conference on Networks, pp.1-6, 2008. ,
DOI : 10.1109/ICON.2008.4772621
Security improvement for management frames in IEEE 802, 11 wireless networks, IJCSNS, 2007. ,
Sequence Number-Based MAC Address Spoof Detection, RAID 2005, pp.309-329, 2006. ,
DOI : 10.1007/11663812_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.3346
New Methods of Spoof Detection in 802.11b Wireless Networking, 2006. ,
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships, IEEE Transactions on Information Forensics and Security, pp.793-808, 2007. ,
DOI : 10.1109/TIFS.2007.910236
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.642.3405
Detecting identity-based attacks in wireless networks using signal prints, Proceedings of the 5th ACM workshop on Wireless security, 2006. ,
DOI : 10.1145/1161289.1161298
Comparative Analysis of Intrusion Detection Approaches, 2010 12th International Conference on Computer Modelling and Simulation, pp.586-591, 2010. ,
DOI : 10.1109/UKSIM.2010.112
Wireless intrusion detection and response, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., pp.68-75, 2003. ,
DOI : 10.1109/SMCSIA.2003.1232403
Wireless Intrusion Detection Systems (WIDS), 19th Annual Computer Security Applications Conference, 2003. ,
Intrusion detection solution to WLANs, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, pp.553-556, 2004. ,
An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks, In: Novel Algorithms and Techniques in Telecommunications and Networking, pp.355-360, 2010. ,
Adaptive neurofuzzy intrusion detection systems, In: Proceedings of ITCC, vol.1, pp.70-74, 2004. ,
A Neuro-Fuzzy Classifier for Intrusion Detection Systems, CSICC, 2006. ,
Application of artificial neural network in detection of DOS attacks, Proceedings of the 2nd international conference on Security of information and networks, SIN '09, 2009. ,
DOI : 10.1145/1626195.1626252
Security analysis and improvements for IEEE 802.11i, Proc. of the 12th Annual Network and Distributed System Security Symp, pp.90-110, 2005. ,
Application of artificial neural network in detection of probing attacks, 2009 IEEE Symposium on Industrial Electronics & Applications, pp.557-562, 2009. ,
DOI : 10.1109/ISIEA.2009.5356382