In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...
Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an inl...
Abstract--Group-orthogonal multicarrier code-division multiple access (GO-MC-CDMA) has been proposed as an attractive mutiplexing technique for the uplink segment of wireless syste...
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
— Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. Because these networks carry large...