|
Volumn , Issue , 2003, Pages 68-75
|
Wireless intrusion detection and response
a a a a |
Author keywords
Communication system security; Data security; Intrusion detection; Linux; Monitoring; Protection; Prototypes; Radio frequency; Wireless application protocol; Wireless networks
|
Indexed keywords
COMPUTER CRIME;
COMPUTER OPERATING SYSTEMS;
CYBERNETICS;
LINUX;
MERCURY (METAL);
MONITORING;
NETWORK PROTOCOLS;
NETWORK SECURITY;
SECURITY OF DATA;
WIRELESS NETWORKS;
WIRELESS TELECOMMUNICATION SYSTEMS;
COMMUNICATION SYSTEM SECURITY;
PROTECTION;
PROTOTYPES;
RADIO FREQUENCIES;
WIRELESS APPLICATION PROTOCOLS;
INTRUSION DETECTION;
|
EID: 84946397365
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SMCSIA.2003.1232403 Document Type: Conference Paper |
Times cited : (46)
|
References (13)
|