1 |
Pablo Serrano, Albert Banchs, Valerio Targon, and Jose Felix Kukjelka, "Detecting Selfish Configurations in 802.11 WLANs," IEEE Communications Letters, vol. 14, issue. 2, pp. 142-144, 2010.
DOI
|
2 |
한유훈, 강동훈, 석승준, "통계적 분석을 통한 무선랜의 탐욕(Greedy) 노드 탐지," 통신망 운용 관리학술 대회, 2011.
|
3 |
M. Cagalj, S. Ganeriwal, I Aad, and J.P Hubaux, "On Selfish Behavior in CSMA/CA Networks," in Proc. of the IEEE INFOCOM, vol. 4, pp. 2513-2524, 2005.
|
4 |
C.E. Shannon, "Prediction and entropy of printed English," The Bell System Technical Journal , vol. 30, pp. 50-64, 1951.
DOI
|
5 |
Giseop No, Ilkyeun Ra, "An Efficient and Reliabl e DDoS Attack Detection Using a Fast Entropy Computation Method," Communications and Information Technology, pp. 1223-1228, Sept. 2009.
|
6 |
Qian Quan, Che Hong-Yi, Zhang Rui, "Entropy Based Method for Network Anomaly Detection," IEEE Pacific Rim International Symposium on Dependable Computing, pp. 189-191, 2009.
|
7 |
Artur Ziviani, Antonio Tadeu A. Gomes, Marcelo L. Monsores, Paulo S. S. Rodrigues, "Network Anomaly detection using Nonextensive Entropy," IEEE Communication Letters, vol. 11, no. 12, pp. 1034-1036, 2007.
DOI
|
8 |
Konstantinos Pelechrinis, Guanhua Yan., etc. "Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks," IEEE Infocom 2009 proceedings, pp. 657-665, 2009.
|
9 |
IEEE 802.11 Working Group, "IEEE 802.11-2007: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," June 2007.
|
10 |
M. Raya, J. P. Hubaux, and I. Aad, "DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspot," IEEE Transaction on Mobile Computing, vol. 5, issue. 12, pp. 1681-1705, Dec. 2006.
|