![]() |
| 2008 | ||
|---|---|---|
| 2 | EE | Yong Sheng, Keren Tan, Guanling Chen, David Kotz, Andrew Campbell: Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. INFOCOM 2008: 1768-1776 |
| 2005 | ||
| 1 | EE | Yong Sheng, V. V. Phoha, S. M. Rovnyak: A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Transactions on Systems, Man, and Cybernetics, Part B 35(4): 826-833 (2005) |
| 1 | Andrew Campbell | [2] |
| 2 | Guanling Chen | [2] |
| 3 | David Kotz | [2] |
| 4 | V. V. Phoha | [1] |
| 5 | S. M. Rovnyak | [1] |
| 6 | Keren Tan | [2] |