1 |
Phil Simon, "Too Big to Ignore: The Business Case for Big Data," Wiley and SAS Business Series, pp 89-90, 2013.
|
2 |
John Robert Anderson et al,. "Machine Learning: An artificial intelligence approach," Morgan Kaufmann, pp. 19, 1986.
|
3 |
Bernhard E. Boser, Isabelle M. Guyon, and Vladimir N. Vapnik, "A training algorithm for optimal margin classifiers," Proceedings of the fifth annual workshop on Computational learning theory, pp. 144-152, Jul. 1992.
|
4 |
Vladimir N. Vapnik, "The nature of statistical learning theory," Springer, pp. 133-136, 2000.
|
5 |
Colin Campbell and Nello Cristianini, "Simple learning algorithms for training support vector machines," Technical report, University of Bristol, 1998.
|
6 |
Massimiliano Pontil and Alessandro Verri, "Properties of support vector machines," Neural Computation, Vol. 10, No. 4, pp. 955-974, Mar. 1998.
DOI
ScienceOn
|
7 |
Simon Haykin, "Neural networks: a comprehensive foundation," Prentice Hall PTR, 1994.
|
8 |
Ram Periakaruppan and Evi Nemeth, "GTrace - A Graphical Traceroute Tool," LISA '99 Proceedings of the 13th USENIX conference on System administration, pp 69-78, 1999.
|
9 |
Pyeong-jung Song and Yeon-seung Shin, "LTE Mobility Management Technology for Network Convergence," Electronics and Telecommunications Trends, 25(6), Dec. 2010.
|
10 |
Mathieu Lacage, Mohammad Hossein Manshaei and Thierry Turletti, "IEEE 802.11 rate adaptation: a practical approach," Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, pp. 126-134, Oct. 2004.
|
11 |
Holma H. and Toskala A., "LTE for UMTS : OFDMA and SCFDMA Based Radio Access," Wiley, pp. 244-245, 2009.
|
12 |
Kenneth Jonsson et al., "Support vector machines for face authentication," Image and Vision Computing, Vol. 20, Issue 5-6, pp. 369-375, Apr. 2002.
DOI
|
13 |
accord - Accord.NET Framework, http://code.google.com/p/accord/
|
14 |
B. Caputo et al., "Appearance-based Object Recognition using SVMs: Which Kernel Should I Use?," Proc of NIPS workshop on Statistical methods for computational experiments in visual processing and computer vision, Whistler, Dec. 2002.
|
15 |
Tarek S. Sobh, "Wi-Fi Networks Security and Accessing Control," IJCNIS, Vol. 5, No. 7, pp.9-20, Jun. 2013.
|
16 |
IEEE P802.11i/D10.0, "Medium Access Control(MAC) security enhancements, amendment 6 to IEEE Standard for local and metropolitan area networks part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications," Apr. 2004.
|
17 |
Changhua He and John C. Mitchell, "Security Analysis and Improvements for IEEE 802.11i," The 12th Annual Network and Distributed System Security Symposium (NDSS'05) Stanford University, pp. 90-110, Feb. 2005.
|
18 |
Henry Paul S and Hui Luo, "WiFi: what's next?," Communications Magazine IEEE, Vol. 40, Issue 12, pp. 66-72, Dec. 2002.
|
19 |
Paramvir Bahl et al., "Enhancing the security of corporate Wi-Fi networks using DAIR," Proceedings of the 4th international conference on Mobile systems, applications and services, pp. 1-14, Jun. 2006.
|
20 |
Daisuke Takahashi et al., "IEEE 802.11 user fingerprinting and its applications for intrusion detection," Computers & Mathematics with Applications, Vol. 60, Issue 2, pp. 307-318, Jul. 2010.
DOI
|
21 |
AirDefense Services Platform - Motorola Solutions USA, http://www.airdefense.net
|
22 |
The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news. NetSt umbler, http://www.netstumbler.com/
|
23 |
Wei Wei et al., "Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs," Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pp. 365-378, Oct. 2007.
|
24 |
RogueScanner Free System Administrat ion software downloads at SourceForge. net, http://sourceforge.net/projects/roguescanner/
|
25 |
Dino Schweitzer, Wayne Brown and Jeff Boleng, "Using visualization to locate rogue access points," Journal of Computing Sciences in Colleges, Vol. 23, Issue 1, pp. 134-140, Oct. 2007.
|
26 |
Payal Bhatia, Christine Laurendeau, and Michel Barbeau, "Solution to the wireless evil-twin transmitter attack," Risks and Security of Internet and Systems (CRiSIS2010), pp. 1-7, Oct. 2010.
|
27 |
Kuo-Fong Kao et al., "A location-aware rogue AP detection system based on wireless packet sniffing of sensor APs," Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 32-36, Mar. 2011.
|
28 |
Paramvir Bahl, and Venkata N. Padmanabhan, "RADAR: An in-building RF-based user location and tracking system," INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, Vol. 2, pp. 775-784, Mar. 2000.
|
29 |
Beyah Raheem et al., "Rogue access point detection using temporal traffic characteristics," Global Telecommunications Conference, 2004. GLOBECOM'04. IEEE, Vol. 7, pp. 2271-2275, Dec. 2004.
|
30 |
Lanier Watkins, Raheem Beyah, and Cherita Corbett, "A passive approach to rogue access point detection," Global Telecommunications Conference 2007 (GLOBECOM'07), pp. 355-360, Nov. 2007.
|
31 |
Hao Han et al., "A measurement based rogue AP detection scheme," INFOCOM 2009, pp. 1593-1601, Apr. 2009.
|