메뉴 건너뛰기




Volumn , Issue , 2003, Pages 76-83

Wireless security threat taxonomy

(2)  Welch, D a   Lathrop, S a  

a NONE

Author keywords

Access protocols; Communication system security; Frequency; Information security; Taxonomy; Telecommunication traffic; Wireless application protocol; Wireless LAN; Wireless networks; Wireless personal area networks

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CYBERNETICS; NETWORK PROTOCOLS; PERSONAL COMMUNICATION SYSTEMS; SECURITY OF DATA; STANDARDS; TAXONOMIES; TELECOMMUNICATION TRAFFIC; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33644591555     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SMCSIA.2003.1232404     Document Type: Conference Paper
Times cited : (98)

References (21)
  • 1
    • 84867460481 scopus 로고    scopus 로고
    • 4 September webpage online ExtremeTech.com
    • Ellison, Craig, Exploiting and Protecting 802.11b Wireless Networks, 4 September 2001, webpage online http://www.extremetech.com/print-article/0,3998,a=13880,00.asp ExtremeTech.com last accessed 20 September 2002.
    • (2001) Exploiting and Protecting 802.11b Wireless Networks
    • Ellison, C.1
  • 4
    • 0007886397 scopus 로고    scopus 로고
    • Masters Thesis, Department of Teleinformatics, Royal Institute of Technology, Stockholm, Sweden. 12 June
    • Moioli, Fabio, Security in Public Access Wireless LAN Networks, Masters Thesis, Department of Teleinformatics, Royal Institute of Technology, Stockholm, Sweden. 12 June 2000.
    • (2000) Security in Public Access Wireless LAN Networks
    • Moioli, F.1
  • 6
    • 84946436157 scopus 로고    scopus 로고
    • Wireless LAN Security: 802.11b and Corporate Networks
    • Webpage online
    • Internet Security Systems, Wireless LAN Security: 802.11b and Corporate Networks. ISS Technical White Paper. Webpage online available at http://documents.iss.net/whitepapers/wireless-LAN-security.pdf last accessed 20 September 2002.
    • ISS Technical White Paper
  • 10
    • 0003948271 scopus 로고    scopus 로고
    • Department of Computer Science University of Maryland. Web page online
    • Arbaugh, William, Narendar Shankar and Y.C. Justin Wan, Your 802.11 Wireless Network has No Clothes. Department of Computer Science University of Maryland. Web page online available at http://www.cs.umd.edu/~waa/wireless.pdf last accessed 20 September 2002.
    • Your 802.11 Wireless Network Has No Clothes
    • Arbaugh, W.1    Shankar, N.2    Wan, Y.C.J.3
  • 12
    • 84946436160 scopus 로고    scopus 로고
    • Advanced 802.11 Attack
    • Lynn, Mike and Robert Baird, Advanced 802.11 Attack, presentation to Black Hat 2002 Conference, Las Vegas, NV 31 July 2002. Available at http://www.blackhat.com/presentations/bh-usa-02/baird-lynn/bh-us-02-lynn-802.11attack.ppt last accessed 20 September 2002.
    • Black Hat 2002 Conference, Las Vegas, NV 31 July 2002
    • Lynn, M.1    Baird, R.2
  • 13
    • 50649120242 scopus 로고    scopus 로고
    • 14 February 02. Webpage online
    • Schwartz, Ephraim, Researcher crack new wireless security spec. InfoWorld. 14 February 02. Webpage online available at http://staging.infoworld.com/articles/hn/xml/02/02/14/020214hnwifispec.xml, last accessed 1 Oct 02.
    • Researcher Crack New Wireless Security Spec
    • Schwartz, E.1
  • 15
    • 84946436162 scopus 로고    scopus 로고
    • 802.1x: What it is, How it's broken, and How to fix it
    • Potter, Bruce, 802.1x: What it is, How it's broken, and How to fix it. presentation to Black Hat 2002 Conference, Las Vegas, NV 31 July 2002. Available at http://www.blackhat.com/html/bh-usa-02/bh-usa-02-speakers.html#Bruce%20Potter last accessed 20 September 2002.
    • Black Hat 2002 Conference, Las Vegas, NV 31 July 2002
    • Potter, B.1
  • 16
    • 26444620370 scopus 로고    scopus 로고
    • April webpage online
    • Whalen, Sean, An Introduction to Arp Spoofing, April 2001 webpage online available at http://packetstormsecurity.nl/papers/protocols/intro-to-arp-spoofing.pdf last accessed 20 September 2002.
    • (2001) An Introduction to Arp Spoofing
    • Whalen, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.