{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:45:27Z","timestamp":1778082327261,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540792314","type":"print"},{"value":"9783540792321","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79232-1_23","type":"book-chapter","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T11:32:33Z","timestamp":1209382353000},"page":"222-231","source":"Crossref","is-referenced-by-count":6,"title":["Malware in IEEE 802.11 Wireless Networks"],"prefix":"10.1007","author":[{"given":"Brett","family":"Stone-Gross","sequence":"first","affiliation":[]},{"given":"Christo","family":"Wilson","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Almeroth","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Belding","sequence":"additional","affiliation":[]},{"given":"Heather","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Konstantina","family":"Papagiannaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Balachandran, A., Voelker, G.M., Bahl, P., Rangan, P.V.: Characterizing User Behavior and Network Performance in a Public Wireless LAN. In: Proc. of ACM SIGMETRICS, Marina Del Rey, CA, June 2002, pp. 195\u2013205 (2002)","DOI":"10.1145\/511334.511359"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Chandra, R., Padmanabhan, V., Zhang, M.: WiFiProfiler: Cooperative Diagnosis in Wireless LANs. In: Proc. of MobiSys, Uppsala, Sweden (June 2006)","DOI":"10.1145\/1134680.1134702"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Z., Gao, L., Kwiat, K.: Modeling the Spread of Active Worms. In: Proc. of IEEE INFOCOM, San Francisco, CA (April 2003)","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Afanasyev, M., Verkaik, P., Benko, P., Chiang, J., Snoeren, A., Savage, S., Voelker, G., Kwiat, K.: Automating Cross-Layer Diagnosis of Enterprise Wireless Networks. In: Proc. of ACM SIGCOMM, Kyoto, Japan (August 2007)","DOI":"10.1145\/1282380.1282384"},{"key":"23_CR5","unstructured":"Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In: Proc. of Usenix Security Symposium, Boston, MA (August 2007)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Heusse, M., Rousseau, F., Berger-Sabbatel, G., Duda, A.: Performance Anomaly of 802.11b. In: Proc. of IEEE INFOCOM, San Francisco, CA (March 2003)","DOI":"10.1109\/INFCOM.2003.1208921"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Jardosh, A., Ramachandran, K., Almeroth, K., Belding-Royer, E.: Understanding Congestion in IEEE 802.11b wireless networks. In: Proc. of Internet Measurement Conference, Berkeley, CA (October 2005)","DOI":"10.1145\/1330107.1330140"},{"key":"23_CR8","unstructured":"Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based Spyware Detection. In: Proc. of Usenix Security Symposium, Vancouver, Canada (August 2006)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Kotz, D., Essien, K.: Analysis of a Campus-wide Wireless Network. In: Proc. of ACM MOBICOM, Atlanta, GA (September 2002)","DOI":"10.1145\/570645.570659"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Meng, X., Wong, S., Yuan, Y., Lu, S.: Characterizing Flows in Large Wireless Data Networks. In: Proc. of ACM MOBICOM, Philadelphia, PA (September 2004)","DOI":"10.1145\/1023720.1023738"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G.M., Savage, S.: Inferring Internet Denial-of-Service Activity. In: Proc. of Usenix Security Symposium, Washington D.C (August 2001)","DOI":"10.21236\/ADA400003"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Rodrig, M., Reis, C., Mahajan, R., Wetherall, D., Zahorjan, J.: Measurement-based Characterization of 802.11 in a Hotspot Setting. In: Proc. of ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis (E-WIND), Philadelphia, PA (August 2005)","DOI":"10.1145\/1080148.1080150"},{"key":"23_CR13","unstructured":"Schwab, D., Bunt, R.: Characterizing the Use of a Campus Wireless Network. In: Proc. of IEEE INFOCOM, Hong Kong, China (March 2004)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Network Measurement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79232-1_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:14:40Z","timestamp":1619522080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79232-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540792314","9783540792321"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79232-1_23","relation":{},"subject":[]}}