{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:04:57Z","timestamp":1725901497718},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339400"},{"type":"electronic","value":"9783642339417"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33941-7_36","type":"book-chapter","created":{"date-parts":[[2012,10,31]],"date-time":"2012-10-31T15:27:42Z","timestamp":1351697262000},"page":"391-401","source":"Crossref","is-referenced-by-count":0,"title":["Mathematical Model and Formalization for DTF Method"],"prefix":"10.1007","author":[{"given":"Emanuel Ciprian","family":"Sasu","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Sasu, E.C., Prostean, O.: Using Constant Traffic to Specific IP Destinations for Detecting Spoofed MAC Addresses in Local Area Networks. In: IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics, Timisoara, Romania, pp. 677\u2013681 (2010)","DOI":"10.1109\/ICCCYB.2010.5491327"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Sasu, E.C., Prostean, O., Groza, V.: Proving the Efficiency of DTF Method in a Local Area Network. In: IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics, Timisoara, Romania, pp. 683\u2013687 (2010)","DOI":"10.1109\/ICCCYB.2010.5491324"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Sasu, E.C., Prostean, O.: Testing DTF Method for Applicability in a Real Environment. In: 7th IEEE International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, pp. 285\u2013289 (2012)","DOI":"10.1109\/SACI.2012.6250017"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Sasu, E.C., Prostean, O.: Network Simulation for MAC Spoofing Detection, using DTF Method. In: 7th IEEE International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, pp. 291\u2013296 (2012)","DOI":"10.1109\/SACI.2012.6250018"},{"key":"36_CR5","unstructured":"WinPcap driver, \n                  \n                    http:\/\/www.winpcap.org\/"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active Behavioral Fingerprinting of Wireless Devices. In: WiSec 2008, Alexandria, Virginia, USA, pp. 56\u201361 (2008)","DOI":"10.1145\/1352533.1352543"},{"issue":"1","key":"36_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TNET.2006.890133","volume":"15","author":"H. Wang","year":"2006","unstructured":"Wang, H., Jin, C., Shin, K.G.: Defense Against Spoofed IP Traffic Using Hop-Count Filtering. IEEE\/ACM Transactions on Networking\u00a015(1), 40\u201353 (2006)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"36_CR8","unstructured":"Loh, D.C.C., Cho, C.Y., Tan, C.P., Lee, R.S.: Identifying Unique Devices through Wireless Fingerprinting. In: WiSec 2008, Alexandria, Virginia, USA, pp. 104\u2013115 (2008)"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Jana, S., Kasera, S.K.: On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews. In: MobiCom 2008, San Francisco, California, USA, pp. 46\u201355 (2008)","DOI":"10.1145\/1409944.1409958"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Wei, W., Suh, K., Wang, B., Gu, Y., Kurose, J., Towsley, D.: Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs. In: IMC 2007, San Diego, California, USA, pp. 365\u2013378 (2007)","DOI":"10.1145\/1298306.1298357"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless Device Identification with Radiometric Signatures. In: MobiCom 2008, San Francisco, California, USA, pp. 46\u201355 (2008)","DOI":"10.1145\/1409944.1409959"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33941-7_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:26:49Z","timestamp":1620131209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33941-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642339400","9783642339417"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33941-7_36","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}