Author of the publication

Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation.

, , , and . IEEE Trans. Dependable Secur. Comput., 12 (5): 585-596 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting., , and . IEEE Trans. Reliability, 64 (1): 221-233 (2015)Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices., , , and . ICON, page 665-671. IEEE, (2003)A spectrally modulated, spectrally encoded analytic framework for carrier interferometry signals., , , , and . IWCMC, page 1009-1014. ACM, (2006)Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting., , and . Secur. Commun. Networks, (2018)Ensuring the longevity of WirelessHART devices in industrial automation and control systems using distinct native attribute fingerprinting., , , and . Int. J. Crit. Infrastructure Prot., (December 2023)Novel overlay/underlay cognitive radio waveforms using SD-SMSE framework to enhance spectrum efficiency-part II: analysis in fading channels., , , , and . IEEE Trans. Commun., 58 (6): 1868-1876 (2010)Gabor-based RF-DNA fingerprinting for classifying 802.16e WiMAX Mobile Subscribers., , and . ICNC, page 7-13. IEEE Computer Society, (2012)PHY foundation for multi-factor ZigBee node authentication., , and . GLOBECOM, page 795-800. IEEE, (2012)An Operational and Performance Overview of the IRIDIUM Low Earth Orbit Satellite System., , , and . IEEE Commun. Surv. Tutorials, 2 (2): 2-10 (1999)Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation., , , and . IEEE Trans. Dependable Secur. Comput., 12 (5): 585-596 (2015)