Gustafsson et al., 2007 - Google Patents
Security Risk Evaluation of the FON NetworkGustafsson et al., 2007
View PDF- Document ID
- 6879841570552283620
- Author
- Gustafsson J
- Thor D
- Publication year
External Links
Snippet
Hotspots are publicly available wireless access points to which any Wi-Fi enabled device can connect. Traditionally maintained by companies, hotspot services are now also being provided by individuals. The company FON enables this concept on a large scale by …
- 238000011156 evaluation 0 title description 127
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
- H04W92/20—Interfaces between hierarchically similar devices between access points
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
- H04W88/085—Access point devices with remote components
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9935891B1 (en) | Assessing a computing resource for compliance with a computing resource policy regime specification | |
Scarfone et al. | Technical guide to information security testing and assessment | |
US20080047016A1 (en) | CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations | |
US9264395B1 (en) | Discovery engine | |
US9106661B1 (en) | Computing resource policy regime specification and verification | |
Bakhshi | Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors | |
US20080282338A1 (en) | System and method for preventing the reception and transmission of malicious or objectionable content transmitted through a network | |
Cichonski et al. | Computer security incident handling guide | |
Nthala et al. | Rethinking home network security | |
Wright | The IT regulatory and standards compliance handbook: How to survive information systems audit and assessments | |
Lustosa et al. | Safety management applied to smart cities design | |
Amrin | The impact of cyber security on SMEs | |
Scarfone et al. | Sp 800-115. technical guide to information security testing and assessment | |
Gallaher et al. | Cyber security: Economic strategies and public policy alternatives | |
Jackson | Network security auditing | |
Osborne | How to cheat at managing information security | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
Toth et al. | NIST MEP cybersecurity self-assessment handbook for assessing NIST SP 800-171 security requirements in response to DFARS cybersecurity requirements | |
Treacy et al. | Organizational cybersecurity post the pandemic: an exploration of remote working risks and mitigation strategies | |
Al-Hashimi et al. | Evaluate information security governance frameworks in cloud computing environment using main and sub criteria | |
Kahraman | Evaluating IT security performance with quantifiable metrics | |
Mana et al. | Eurocontrol/Eatm-Cert Services-Supporting Aviation To Better Manage Cyber Threats | |
Modderkolk | Zero trust maturity matters: Modeling cyber security focus areas and maturity levels in the zero trust principle | |
Gustafsson et al. | Security Risk Evaluation of the FON Network | |
Saed et al. | Data governance cloud security checklist at infrastructure as a service (IaaS) |