1 |
A. Scarfo, "New security perspectives around BYOD," in Proc. 2012 Seventh Int'l Conf. Broadband, Wireless Computing, Commun. and Applications(BWCCA), pp. 446-451, Nov. 2012.
|
2 |
K. Rhee, H. Kim, and H. Y. Na, "Security test methodology for an agent of a mobile device management system," Int'l J. Security and Its Applications, Vol. 6, No. 2, Apr. 2012.
|
3 |
J. Burke, B. Hartselle, B. Kneuven, and B. Morgan, Wireless security attacks and defense, Retrieved May 2006, from http://www.windo wsecurity.com/whitepapers/Wireless_Security/ Wireless-Security-Attacks-Defenses.html.
|
4 |
AirDefense, "Tired of rogues: Solutions for detecting and eliminating rogue wireless networks," AirDefense white paper, 2011.
|
5 |
AirTight Networks, "Conquering the minefield of Soft rogue APs in the enterprise," AirTight white paper, 2012.
|
6 |
S. Jana and S. K. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," IEEE Trans. Mobile Computing, Vol. 9, No. 3, pp. 449-462, Mar. 2010.
DOI
ScienceOn
|
7 |
P. Bhatia, C. Laurendeau, and M. Barbeau, "Solution to the wireless evil-twin transmitter attack," in Proc. IEEE CRiSIS 2010, pp. 1-7, Oct. 2010.
|
8 |
S. Shetty, M. Song, and L. Ma, "Rogue access point detection by analyzing network traffic characteristics," in Proc. IEEE MILCOM 2007, pp. 1-7, Oct. 2007.
|
9 |
W. Wei, S. Jaiswal, J. Kurose, and D. Towsley, "Identifying 802.11 traffic from passive measurements using iterative bayesian inference," in Proc. In: 25th IEEE int'l conf. on computer commun.(INFOCOM), pp. 1-12, Apr. 2006.
|
10 |
F. Guo and T. Chiueh, "Sequence numberbased MAC address spoof detection," in Proc. RAID 2005, pp. 309-329, Sept. 2005.
|
11 |
D. Monica, and C. Ribeiro, "WiFiHop -mitigating the evil twin attack through multi-hop detection," in Proc. ESORICS 2011, pp. 21-39, Sept. 2011.
|
12 |
Y. Song, C. Yang, and G. Gu, "Who is peeping at your passwords at starbucks? - To catch an evil twin access point," in Proc. IEEE/IFIP DSN 2010, pp. 323-332, Chicago, IL, USA, Jun. 2010.
|
13 |
S. K. Park and J. h. Lee, "Propulsion systems and practices for smart work(스마트워크 추진체계 및 사례)," J. KICS, vol. 29, no 12, pp. 3-9, Nov. 2012
|
14 |
H. Kim, Y. J. Cbo, and S.-R. Oh, "CAMUS - a middleware supporting context-aware services for network-based robots," IEEE Workshop on Advanced Robotics and Its Social Impacts, pp. 237-242, Jun. 2005.
|
15 |
J. Byun, I. Hong, B. Kang, and S. Park, "A smart energy distribution and management system for renewable energy distribution and context-aware services based on user patterns and load forecasting," IEEE Trans. Consumer Electronics, vol. 57, no. 2, May 2011.
|