최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회. 컴퓨팅의 실제 논문지 = KIISE transactions on computing practices, v.23 no.7, 2017년, pp.397 - 407
윤광욱 (부산대학교 전자전기컴퓨터공학부) , 최석환 (부산대학교 전자전기컴퓨터공학부) , 안상언 (부산대학교 전자전기컴퓨터공학부) , 김정구 (부산대학교 전자전기컴퓨터공학부) , 최윤호 (부산대학교 전자전기컴퓨터공학부)
Wireless networks make the users' work more convenient and efficient, but such networks can impair the availability of network resources and can cause leakage of important corporate information when there are security threats. In particular, damage has increased because of security attacks that take...
Kim Ji-an, 2014, "wireless Network Security Threat Countermeasures WIPS," Available:http://www.boannews.com/media/view.asp?idx39719
A. Scarfo, "New security perspectives around BYOD," Proc. 7th Int. Conf. Broadband, Wireless Computing, Commun., Applicat. (BWCCA), pp. 446- 451, Victoria, Canada, Nov. 2012.
Robert Mitchell, Ing-Ray Chen, "A survey of intrusion detection in wireless network applications," Journal Computer Communications archive Volume 42 pp. 1-23, Apr. 2014.
AirTight Network, "Airtight network wireless security," AirTight White Paper, 2012.
Lee Gi Hyouk, Young Jae Dong, "A Study on the Construction instance of the Wireless Intrusion Prevention System for illegal AP detection threat preventions," Proc. of Symposium of the Korean Institute of communications and information Sciences, pp. 1004-1015, November, 2008
Md. Waliullah, Diane Gan, "Wireless LAN Security Threats & Vulnerabilities : A Literature Review," International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 5, No. 1, 2014.
Sushma, Deepak Nandal, Vikas Nanda, "Security Threats in Wireless Sensor Networks," International Journal of Computer Science & Management Studies(IJCSMS), Vol. 11, Issue 01, May 2011.
Bellardo J, Savage S, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," USENIX security (pp. 15-28), Aug. 2003.
Aslam, Baber, M. Hasan Islam, and Shoab A. Khan, "802.11 disassociation DoS Attack and its solutions: A survey," Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006, Proc. of the First. IEEE, 2006, Sep. 2006.
Onat I, Miri A, "An intrusion detection system for wireless Sensor networks," WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005, Vol. 3, pp. 253-259. IEEE, Aug, 2005.
Karen Scarfone, "Comparing the top wireless intrusion prevention systems," Wireless intrusion prevention systems: A buyer's guide, Scarfone Cybersecurity, 2016.
Woo-Hyuk Jung, Seung-hyung Lee, "Detecting and responding to security attacks about AP, The Journal of The Korean Institute of Communication Sciences," 2016.
Sansung, "Samsung wireless Enterprise sanmsung security AP, WHITE PAPER," 2013.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.