{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:20:21Z","timestamp":1756894821949},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/wd.2010.5657702","type":"proceedings-article","created":{"date-parts":[[2010,12,10]],"date-time":"2010-12-10T23:02:46Z","timestamp":1292022166000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["An anomaly-based intrusion detection system for IEEE 802.11 networks"],"prefix":"10.1109","author":[{"given":"Luis Miguel","family":"Torres","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Magana","sequence":"additional","affiliation":[]},{"given":"Mikel","family":"Izal","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Morato","sequence":"additional","affiliation":[]},{"given":"Guzman","family":"Santafe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11824633_23"},{"year":"0","key":"ref11","article-title":"Kismet"},{"key":"ref12","article-title":"A policy-based aproach to wireles LAN security management","author":"lapiotis","year":"2005","journal-title":"Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451054"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/ACSAC.2006.48","article-title":"Specification-based intrusion detection in wlans","author":"gill","year":"2006","journal-title":"Computer Security Applications Conference 2006 ACSAC &#x2018;06 22nd Annual"},{"key":"ref15","article-title":"Detecting wireless LAN MAC address spoofing","author":"wright","year":"0","journal-title":"www uninett no\/wlan\/download\/wlan-mac-spoof pdf"},{"key":"ref16","article-title":"Multilevel monitoring and detection systems (MMDS)","author":"dasgupta","year":"2003","journal-title":"Proceedings of the 15th Annual Computer Security Incident Handling Conference"},{"key":"ref17","article-title":"Sequence number-based MAC address spoof detection","author":"guo","year":"2005","journal-title":"Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID'05)"},{"year":"0","key":"ref18","article-title":"Tcpdump\/libpcap"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232403"},{"key":"ref4","article-title":"Practical attacks against WEP and WPA","author":"beck","year":"2008","journal-title":"Cryptology ePrint Archive Report"},{"article-title":"Using the Fluhrer, Mantin, and Shamir attack to break WEP","year":"2001","author":"stubblefield","key":"ref3"},{"key":"ref6","article-title":"Snort - lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th USENIX Conference on System Administration"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/3-540-45474-8_11","article-title":"Experiences with specification-based intrusion detection","author":"uppuluri","year":"2001","journal-title":"RAID &#x2018;00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection"},{"journal-title":"Airtight","article-title":"Spectraguard","year":"0","key":"ref8"},{"journal-title":"Motorola","article-title":"Airdefense solutions","year":"0","key":"ref7"},{"key":"ref2","first-page":"1","article-title":"Weaknesses in the key scheduling algorithm of RC4","author":"fluhrer","year":"2001","journal-title":"Selected Areas in Cryptography Springer Berlin\/Heidelberg"},{"key":"ref1","article-title":"802.11 denial-of-service attacks: Real vulnerabilities and practical solutions","author":"bellardo","year":"2006","journal-title":"Proceedings of the 12th USENIX Security Symposium"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"article-title":"ARP request replay attack","year":"0","author":"aircrack","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.75"}],"event":{"name":"2010 IFIP Wireless Days (WD)","start":{"date-parts":[[2010,10,20]]},"location":"Venice, Italy","end":{"date-parts":[[2010,10,22]]}},"container-title":["2010 IFIP Wireless Days"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644810\/5657694\/05657702.pdf?arnumber=5657702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:08:35Z","timestamp":1497877715000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5657702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wd.2010.5657702","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}