{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:54:50Z","timestamp":1777496090471,"version":"3.51.4"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/mobiq.2007.4451054","type":"proceedings-article","created":{"date-parts":[[2008,2,15]],"date-time":"2008-02-15T15:06:51Z","timestamp":1203088011000},"page":"1-8","source":"Crossref","is-referenced-by-count":28,"title":["Anomaly-Based Behavior Analysis of Wireless Network Security"],"prefix":"10.1109","author":[{"given":"Samer","family":"Fayssal","sequence":"first","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]},{"given":"Youssif","family":"Al-Nashif","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"13","article-title":"Detection of transient in radio frequency fingerprinting using phase characteristics of signals","author":"hall","year":"2003","journal-title":"Proceedings of the 3rd IASTED International Conference on Wireless and Optical Communications (WOC 2003)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378399"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311303"},{"key":"ref13","article-title":"A data mining framework for building intrusion detection models","author":"lee","year":"1999","journal-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023655"},{"key":"ref15","article-title":"net stumbler dot com","author":"slavin","year":"2007"},{"key":"ref16","article-title":"Detecting Wireless LAN MAC Address Spoofing","author":"joshua","year":"2003"},{"key":"ref17","article-title":"Change MAC Addresses on Windows 2000 & XP","year":"2003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.40"},{"key":"ref19","article-title":"How to cope with ARP attacks on LANs","author":"mckeag","year":"2004","journal-title":"Techworld"},{"key":"ref4","article-title":"Data Mining: Practical machine learning tools and techniques","author":"witten","year":"2005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2004.1319575"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132501"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232404"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1220591"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SECCMW.2005.1588312"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990077"},{"key":"ref1","article-title":"Quality-of-protection (QoP)-an online monitoring and self-protection mechanism Selected Areas in Communications","author":"hariri","year":"2005","journal-title":"IEEE Journal on"},{"key":"ref9","article-title":"Specification-Based Intrusion Detection in WLANs","author":"gill","year":"2006","journal-title":"22nd Annual Computer Security Applications Conference"},{"key":"ref20","first-page":"581","article-title":"The implementation of a proactive wireless intrusion detection system","author":"hsieh","year":"0","journal-title":"The Fourth International Conference on Computer and Information Technology CIT '04"},{"key":"ref22","year":"2007","journal-title":"Wireshark"},{"key":"ref21","year":"2007","journal-title":"Wikipedia"},{"key":"ref24","year":"2007","journal-title":"wepdecrypt"},{"key":"ref23","year":"2007","journal-title":"CommView"}],"event":{"name":"2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous)","location":"Philadelphia, PA, USA","start":{"date-parts":[[2007,8,6]]},"end":{"date-parts":[[2007,8,10]]}},"container-title":["2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &amp; Services (MobiQuitous)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4446615\/4450969\/04451054.pdf?arnumber=4451054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T14:10:33Z","timestamp":1489673433000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4451054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/mobiq.2007.4451054","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}