Computer Science ›› 2013, Vol. 40 ›› Issue (10): 56-60.
Previous Articles Next Articles
GUO Pei-yuan,HE Duo-duo and WU Xiao
[1] Park J S,Dicoi D.WLAN Security:Current and Future[J].IEEE Internet Computing,2003,7(5):60-65 [2] Boob S,Jadhav P.Wireless Intrusion Detection System[J].In-terational Journal of Computer Applications,2010,5(8):9-13 [3] Chen Ying-ying,Trappe W,Martin R P.Attack Detection inWireless Localization[C]∥INFOCOM 2007:26th IEEE International Conference on Computer Communications.Piscataway:IEEE,2007:1964-1972 [4] 付雄,彭冰.基于Shadowing模型的无线入侵主机物理定位研究[J].微电子学与计算机,2010,27(12):4-9 [5] Li Bing-hao,Dempster A,Rizos C,et al.Hybrid Method for Localization Using Wlan[C]∥Spatial Sciences Conference.Melbourne:Spatial Sciences Institute,2005:12-16 [6] Dricot J-M,De Doncker P.High-accuracy physical layer model for wireless network simulations in NS-2[C]∥Wireless Ad-Hoc Networks,2004International Workshop.Oulu:CWC Oulu,2004:249-253 [7] Xu Jiu-qiang,Liu Wei,Lang Feng-gao,et al.Distance measurement model based on RSSI in WSN[J].Wireless Sensor Network,2010,2(8):606-616 [8] 彭建盛,李兴秦,志强.三维立体空间定位算法的研究与实现[J].传感器与微系统,2012,31(7):33-35 [9] Lim Yu-xi,Schmoyer T,Levine J,et al.Wireless Intrusion Detection and Response[C]∥ Information Assurance Workshop,2003.IEEE Systems,Man and Cybernetics Society.New York:IEEE,2003:68-75 [10] Kowalik K,Bykowski M,Keegan B,et al.Practical issues of power control in IEEE 802.11wireless devices[C]∥ International Conference on Telecommunications,2008,ICT 2008.Berlin:ICWE,2008:1-5 [11] 杨哲.无线网络安全攻防实战进阶[M].北京:电子工业出版社,2011:12-21 [12] Erceg V,Greenstein L J,Tjandra S Y.An empirically based path loss model for wireless channels in suburban environments[J].IEEE Journal on Selected Areas in Communications,1999,17(7):1205-1211 |
No related articles found! |
|