Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys
暂无分享,去创建一个
[1] K. Passerini,et al. Wireless network security - a discussion from a business perspective , 2005, Symposium, 2005 Wireless Telecommunications.
[2] Tai-hoon Kim,et al. Wireless Network Security: Vulnerabilities, Threats and Countermeasures , 2008 .
[3] Xuling Hu. Study on wireless local area network technology , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[4] Sherali Zeadally,et al. Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[5] V. Guyot. WEP-based security management in IEEE 802.11 wireless sensor networks , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[6] Samad S. Kolahi,et al. Educational institutes: Wireless network standards, security and future , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[7] H. Shinde,et al. Wireless security & privacy , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[8] Santosh Biswas,et al. Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks , 2015, IEEE Communications Letters.
[9] Y. Challal,et al. Enhanced WEP: An efficient solution to WEP threats , 2005, Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005..
[10] Zakaria I. Saleh,et al. Wireless Networks Security in Jordan: A Field Study , 2013 .
[11] Martin Novotný,et al. Lightweight cipher resistivity against brute-force attack: Analysis of PRESENT , 2012, 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS).
[12] H.M. El Badawy,et al. New protocol design for wireless networks security , 2006, 2006 8th International Conference Advanced Communication Technology.
[13] Thomas M. Siep,et al. Paving the way for personal area network standards: an overview of the IEEE P802.15 Working Group for Wireless Personal Area Networks , 2000, IEEE Wirel. Commun..
[14] R.C. Joshi,et al. A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain , 2007, 2007 International Conference on Signal Processing, Communications and Networking.
[15] N. Sahu,et al. Identify Uncertainty of Cyber Crime and Cyber Laws , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[16] Ismael Ripoll,et al. Preventing Brute Force Attacks Against Stack Canary Protection on Networking Servers , 2013, 2013 IEEE 12th International Symposium on Network Computing and Applications.
[17] Jack L. Burbank,et al. Wireless Networking: Understanding Internetworking Challenges , 2013 .
[18] Michael Cavanaugh,et al. CCNA Voice Official Exam Certification Guide , 2008 .
[19] Arash Habibi Lashkari,et al. Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) , 2009, 2009 International Conference on Signal Processing Systems.