-
2
-
-
70449123717
-
A Survey on Wireless Security protocols (WEP,WPA and WPA2/802.11i)
-
ISBN: 978-1-4244-4519-6
-
Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A Survey on Wireless Security protocols (WEP,WPA and WPA2/802.11i), pp. 48-52. IEEE Explore (2009) ISBN: 978-1-4244-4519-6
-
(2009)
IEEE Explore
, pp. 48-52
-
-
Lashkari, A.H.1
Danesh, M.M.S.2
Samadi, B.3
-
3
-
-
84865689120
-
A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network
-
Arockiam, L., Vani, B.: A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network. International Journal on Computer Science and Engineering 02(05), 1563-1571 (2010)
-
(2010)
International Journal on Computer Science and Engineering
, vol.2
, Issue.5
, pp. 1563-1571
-
-
Arockiam, L.1
Vani, B.2
-
4
-
-
84859843880
-
A Comparative Study of the Available Solution to Miinimize the Denial of Service Attacks in WLAN
-
Arockiam, L., Vani, B.: A Comparative Study of the Available Solution to Miinimize the Denial of Service Attacks in WLAN. International Journal of Computing Application and Technology 2(3), 619-625 (2011)
-
(2011)
International Journal of Computing Application and Technology
, vol.2
, Issue.3
, pp. 619-625
-
-
Arockiam, L.1
Vani, B.2
-
5
-
-
47249092804
-
802.11 Disassociation DoS Attack and Its Solutions: A Survey
-
September
-
Aslam, B., Islam, M., Khan, S.: 802.11 Disassociation DoS Attack and Its Solutions: A Survey. In: Proceedings of the First Mobile Computing and Wireless Communication International Conference, Amman, Jordan, pp. 221-226 (September 2006)
-
(2006)
Proceedings of the First Mobile Computing and Wireless Communication International Conference, Amman, Jordan
, pp. 221-226
-
-
Aslam, B.1
Islam, M.2
Khan, S.3
-
6
-
-
77954418786
-
A Solution to Wireless LAN Authentication and Association DoS Attacks
-
August
-
Liu, C., Yu, J.: A Solution to Wireless LAN Authentication and Association DoS Attacks. IAENG International Journal of Computer Science 34(1) (August 2007)
-
(2007)
IAENG International Journal of Computer Science
, vol.34
, Issue.1
-
-
Liu, C.1
Yu, J.2
-
10
-
-
43449095315
-
Access points vulnerabilities to DoS attacks in 802.11 networks
-
Ferreri, F., Bernaschi, M., Valcamonici, L.: Access points vulnerabilities to DoS attacks in 802.11 networks. Wireless Netw. 14, 159-169 (2008)
-
(2008)
Wireless Netw.
, vol.14
, pp. 159-169
-
-
Ferreri, F.1
Bernaschi, M.2
Valcamonici, L.3
-
11
-
-
84925368904
-
802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions
-
Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: USENIX Security Symposium (2003)
-
USENIX Security Symposium (2003)
-
-
Bellardo, J.1
Savage, S.2
-
12
-
-
79952432373
-
An Experimental of DoS Attack and Its Impact on Throughput of IEEE 802.11 Wireless Networks
-
Malekzadeh, M., Ghani, A.A.A., Subramaniam, S., Desa, J.: An Experimental of DoS Attack and Its Impact on Throughput of IEEE 802.11 Wireless Networks. International Journal of Computer Science and Network Security 8(8), 1-5 (2008)
-
(2008)
International Journal of Computer Science and Network Security
, vol.8
, Issue.8
, pp. 1-5
-
-
Malekzadeh, M.1
Ghani, A.A.A.2
Subramaniam, S.3
Desa, J.4
-
13
-
-
66149167110
-
Security Improvement for Management Frames in IEEE 802.11 Wireless Networks
-
Malekzadeh, M., et al.: Security Improvement for Management Frames in IEEE 802.11 Wireless Networks. International Journal of Computer Science and Network Security 7(6), 276-284 (2007)
-
(2007)
International Journal of Computer Science and Network Security
, vol.7
, Issue.6
, pp. 276-284
-
-
Malekzadeh, M.1
-
15
-
-
0037766154
-
Security flaws in 802.11 data link protocols
-
May
-
Cam-Winget, N., Housley, R., Wagner, D., Walker, J.: Security flaws in 802.11 data link protocols. Communications of the ACM 46(5) (May 2003)
-
(2003)
Communications of the ACM
, vol.46
, Issue.5
-
-
Cam-Winget, N.1
Housley, R.2
Wagner, D.3
Walker, J.4
-
16
-
-
80052499574
-
A Survey of Wireless Security
-
Prodanovic, R., Simic, D.: A Survey of Wireless Security. Journal of Computing and Information Technology, CIT 15(3), 237-255 (2007)
-
(2007)
Journal of Computing and Information Technology, CIT
, vol.15
, Issue.3
, pp. 237-255
-
-
Prodanovic, R.1
Simic, D.2
-
19
-
-
0003802960
-
-
the VINT Project January 6
-
The ns Manual, the VINT Project (January 6, 2009), http://www.scribd.com/ doc/52291274/Network-Simulator-2-Manual
-
(2009)
The Ns Manual
-
-
-
20
-
-
84865700507
-
-
http://www.isi.edu/nsnam/ns/nsdocumentation.Html
-
-
-
|