A multi-dimensional classification framework for developing context-specific Wireless Local Area Network attack taxonomies
暂无分享,去创建一个
[1] W.A. Arbaugh. Wireless Security Is Different , 2003, Computer.
[2] Frederick B. Cohen,et al. Protection and Security on the Information Superhighway , 1995 .
[3] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[4] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[5] Chi-Chun Lo,et al. The proactive intrusion prevention for Wireless Local Area Network , 2006, Int. J. Mob. Commun..
[6] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[7] T. S. Perry,et al. Can computer crime be stopped? The proliferation of microcomputers in today's information society has brought with it new problems in protecting both computer systems and their resident intelligence , 1984, IEEE Spectrum.
[8] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .
[9] Raymond R. Panko,et al. Business Data Networks and Telecommunications , 2008 .
[10] Scott D. Lathrop,et al. Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[11] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[12] Young B. Choi,et al. Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance , 2006, Int. J. Mob. Commun..