The Need for a Technical Approach to Digital Forensic Evidence Collection for Wireless Technologies
暂无分享,去创建一个
[1] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[2] Ryan Russell,et al. Stealing the Network: How to Own an Identity (Stealing the Network) , 2005 .
[3] W.A. Arbaugh. Wireless Security Is Different , 2003, Computer.
[4] D.A. Dai Zovi,et al. Attacking automatic wireless network selection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[5] B. Turnbull,et al. The 802.11 Technology Gap - Case Studies in Crime , 2005, TENCON 2005 - 2005 IEEE Region 10 Conference.
[6] M. B. Mukasey,et al. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .