AUTOMATION FRAMEWORK FOR ROGUE ACCESS POINT MITIGATION IN IEEE 802.1X-BASED WLAN
暂无分享,去创建一个
[1] Mamoona Rafique,et al. Exploring Static and Live Digital Forensics: Methods, Practices and Tools , 2013 .
[2] Mohsen Guizani,et al. A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.
[3] Frank Adelstein,et al. Live forensics: diagnosing your system without killing it first , 2006, CACM.
[4] Abhijit S. Bodhe,et al. RAPD Algorithm: Detection of Rogue Access Point in Wireless Network , 2013 .
[5] Jim Geier,et al. Implementing 802.1X Security Solutions for Wired and Wireless Networks , 2008 .
[6] Jyh-Cheng Chen,et al. Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Communications Magazine.
[7] Orhan Ozan. Denial of service attacks on 802.1X security protocol , 2004 .
[8] V. S. Shankar Sriram,et al. Detecting and eliminating Rogue Access Points in IEEE-802.11 WLAN - a multi-agent sourcing Methodology , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).
[9] Mazdak Zamani,et al. A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[10] Min Song,et al. A Hidden Markov Model based approach to detect Rogue Access Points , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[11] Shital V Jagtap,et al. Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior , 2010 .
[12] Sachin Shetty,et al. Rogue Access Point Detection by Analyzing Network Traffic Characteristics , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[13] Shilpi Gupta,et al. Wireless Network Security Protocols A Comparative Study , 2012 .
[14] Jemal H. Abawajy,et al. Wi-Fi security: wireless with confidence , 2011 .