1
Phillip Andrew Porras, Michael G Corr, Steven Mark Dawson, David Watt, David Manseau, John Peter Marcotullio: Method and apparatus for identifying wireless transmitters. SRI International, August 21, 2012: US08249028 (156 worldwide citation)

In one embodiment, the present invention is a method and apparatus for identifying wireless transmitters. In one embodiment, a method for identifying a transmitter in a wireless computing network includes extracting one or more radio frequency signal characteristics from a communication from the tra ...


2
Phillip Andrew Porras, Michael G Corr, Steven Mark Dawson, David Watt, David Manseau, John Peter Marcotullio: Method and apparatus for wireless network security. SRI International, May 25, 2010: US07724717 (14 worldwide citation)

In one embodiment, the present invention is a method and apparatus for wireless network security. In one embodiment, a method for securing a wireless computing network includes receiving a communication from an unidentified transmitter, identifying the transmitter in accordance with a fingerprint ge ...


3
Phillip Andrew Porras, Michael G Corr, Steven Mark Dawson, David Watt, David Manseau, John Peter Marcotullio: Method and apparatus for identifying wireless transmitters. Patterson & Sheridan, Sri International, February 1, 2007: US20070025245-A1

In one embodiment, the present invention is a method and apparatus for identifying wireless transmitters. In one embodiment, a method for identifying a transmitter in a wireless computing network includes extracting one or more radio frequency signal characteristics from a communication from the tra ...


4
Phillip Andrew Porras, Michael G Corr, Steven Mark Dawson, David Watt, David Manseau, John Peter Marcotullio: Method and apparatus for wireless network security. Patterson & Sheridan, Sri International, February 1, 2007: US20070025265-A1

In one embodiment, the present invention is a method and apparatus for wireless network security. In one embodiment, a method for securing a wireless computing network includes receiving a communication from an unidentified transmitter, identifying the transmitter in accordance with a fingerprint ge ...