|
[1]S. M. Bellovin, “A technique for counting NATed Hosts,”In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement, November 2002, pp.267– 272. [2]R. Beverly, “A robust classifier for passive TCP/IP fingerprinting,” In Proceedings of Passive and Active Network Measurement, 5th International Workshop, 2004, pp.158–167. [3]R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, “Rogue access point detection using temporal traffic characteristics,”In Proceedings of IEEE GLOBECOM, 2004, pp. 2271–2275. [4]S. Deering and R. Hinden, “Internet Protocol, Version 6 (IPv6) Specification,” RFC 2460, Internet Engineering Task Force, December 1998. [5]B. Dutcher, “The NAT Handbook:Implementing and Managing Network Address Translation,” John Wiley & Sons, January 2001. [6]T. Hain, “Architectural implications of NAT,”RFC 2993, Internet Engineering Task Force, November 2000. [7]V. Jacobson, R. Braden, and D.Borman, “TCP Extensions for High Performance,” RFC 1323, Internet Engineering Task Force , May 1992. [8]T. Kohno, A. Broido, and K. C. Claffy, “Remote physical device fingerprinting,” In IEEE Symposium on Security and Privacy, 2005, pp. 211–225. [9]S. J. Murdoch, “Detecting temperature through clock skew,” In Proceedings of the 23rd Chaos Communication Congress, December 2006. [10]J. Postel, “Transmission Control Protocol,” RFC 793, Internet Engineering Task Force, September 1981. [11]Y. Rekhter, B. Moskowitz, D. Karrenberg, and G. de Groot, “Address Allocation for Private Internets,” RFC 1597, Internet Engineering Task Force, March 1994. [12]D. Senie, “Network address translator (nat) -friendly application design guidelines,” RFC 3235, Internet Engineering Task Force, January 2002. [13]P. Srisuresh and K. Egevang, “Traditional IP Network Address Translator (Traditional NAT),” RFC 3022, Internet Engineering Task Force, January 2001. [14]R. Stevens, “TCP/IP Illustrated (Vol. 1):The Protocols,”Addison Wesley, 1994. [15]B. Veal, K. Li, and D. Lowenthal, “New Methods for Passive Estimation of TCP Round-Trip Times,” In Proceedings of Passive and Active Measurements, 2005. [16]WinDump:tcpdump for Windows, http://www.winpcap.org/ [17]林志杰, 高國峰, 廖宜恩,“植基於封包分析之非法無線基地台偵測方法,”Workshop on Wireless, Ad Hoc and Sensor Networks, National Central University, August. 1-2, 2005, pp. 427-431. [18]禹凡, “無線網路通訊概論,”文魁出板社, 2002.
|