{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:08:49Z","timestamp":1763467729644},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540317784"},{"type":"electronic","value":"9783540317791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11663812_16","type":"book-chapter","created":{"date-parts":[[2006,1,20]],"date-time":"2006-01-20T12:57:08Z","timestamp":1137761828000},"page":"309-329","source":"Crossref","is-referenced-by-count":52,"title":["Sequence Number-Based MAC Address Spoof Detection"],"prefix":"10.1007","author":[{"given":"Fanglu","family":"Guo","sequence":"first","affiliation":[]},{"given":"Tzi-cker","family":"Chiueh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"IEEE 802.11 Standard, http:\/\/standards.ieee.org\/getieee802\/download\/802.11-1999.pdf"},{"key":"16_CR2","unstructured":"Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the USENIX Security Symposium, Washington DC (August 2003)"},{"key":"16_CR3","unstructured":"WEPWedgie, http:\/\/sourceforge.net\/projects\/wepwedgie\/"},{"key":"16_CR4","unstructured":"void11, http:\/\/www.wlsec.net\/void11\/"},{"key":"16_CR5","unstructured":"AirJack, http:\/\/sourceforge.net\/projects\/airjack\/"},{"key":"16_CR6","unstructured":"Airsnarf, http:\/\/airsnarf.shmoo.com\/"},{"key":"16_CR7","unstructured":"KisMAC, http:\/\/binaervarianz.de\/projekte\/programmieren\/kismac\/"},{"key":"16_CR8","unstructured":"dsniff, http:\/\/www.monkey.org\/~dugsong\/dsniff"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: Mobicom 2001 (2001)","DOI":"10.1145\/381677.381695"},{"key":"16_CR10","unstructured":"Wright, J.: Detecting Wireless LAN MAC Address Spoofing, http:\/\/home.jwu.edu\/jwright\/papers\/wlan-mac-spoof.pdf"},{"key":"16_CR11","unstructured":"Cardenas, E.D.: MAC Spoofing\u2013An Introduction, http:\/\/www.giac.org\/practical\/GSEC\/Edgar_Cardenas_GSEC.pdf"},{"key":"16_CR12","unstructured":"Dasgupta, D., Gonzalez, F., Yallapu, K., Kaniganti, M.: Multilevel Monitoring and Detection Systems (MMDS). In: The proceedings of the 15th Annual Computer Security Incident Handling Conference (FIRST), Ottawa, Canada, June 22-27 (2003)"},{"key":"16_CR13","unstructured":"Hall, J., Barbeau, M., Kranakis, E.: Using Transceiverprints for Anomaly Based Intrusion Detection. In: Proceedings of 3rd IASTED, CIIT 2004, St. Thomas, US Virgin Islands, November 22-24 (2004)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Yeo, J., Youssef, M., Agrawala, A.: A framework for wireless LAN monitoring and its applications. In: Proceedings of the 2004 ACM workshop on Wireless security, Philadelphia, PA, USA, October 1 (2004)","DOI":"10.1145\/1023646.1023660"},{"key":"16_CR15","unstructured":"Robinson, F.: 802.11i and WPA Up Close. Network Computing (2004)"},{"key":"16_CR16","unstructured":"Mishra, A., Arbaugh, W.: An Initial Security Analysis of the IEEE 802.1X Standard. CS-TR 4328, Department of Computer Science, University of Maryland, College Park (December 2002)"},{"key":"16_CR17","unstructured":"AirDefense. Enterprise Wireless LAN Security and WLAN Monitoring, http:\/\/www.airdefense.net\/"},{"key":"16_CR18","unstructured":"Aruba Wireless Networks. Wireless Intrusion Protection, http:\/\/www.arubanetworks.com\/pdf\/techbrief-IDS.pdf"},{"key":"16_CR19","unstructured":"AirMagnet, http:\/\/www.airmagnet.com\/products\/enterprise.htm"},{"key":"16_CR20","unstructured":"Malinen, J.: Host AP driver for Intersil Prism2\/2.5\/3, http:\/\/hostap.epitest.fi\/"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11663812_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:04:27Z","timestamp":1605643467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11663812_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540317784","9783540317791"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11663812_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}