Iheagwara et al., 2005 - Google Patents
Architectural and functional issues in systems requirements specifications for wireless intrusion detection systems implementationIheagwara et al., 2005
- Document ID
- 8298057048865369709
- Author
- Iheagwara C
- Blyth A
- Bennett M
- Publication year
- Publication venue
- 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)
External Links
Snippet
The task of detecting, repulsing and preventing attacks in wireless environments is becoming more and more difficult as a result of several factors including defective design and improper requirements specification of wireless intrusion detection systems. Systems …
- 238000001514 detection method 0 title abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7907565B2 (en) | System and method for managing wireless devices in an enterprise | |
| Karygiannis et al. | Wireless Network Security:. | |
| US7860253B2 (en) | Wireless perimeter security device and network using same | |
| US20060072527A1 (en) | Secure authentication and network management system for wireless LAN applications | |
| Noor et al. | Wireless networks: developments, threats and countermeasures | |
| US20190387408A1 (en) | Wireless access node detecting method, wireless network detecting system and server | |
| Banerjee et al. | A review on different Intrusion Detection Systems for MANET and its vulnerabilities | |
| Scarfone et al. | Guide to securing legacy IEEE 802.11 wireless networks | |
| Iheagwara et al. | Architectural and functional issues in systems requirements specifications for wireless intrusion detection systems implementation | |
| Shourbaji et al. | Wireless intrusion detection systems (WIDS) | |
| Scarfone et al. | Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT) | |
| Mahrenholz et al. | Detecting Low-Level Attacks on Wireless OT Networks | |
| Vijayalakshmi | Genetic Algorithms for Wireless Network Security | |
| Scarfone et al. | Sp 800-48 rev. 1. guide to securing legacy ieee 802.11 wireless networks | |
| Nand | Developing a theory of portable public key infrastructure (PORTABLEPKI) for mobile business security | |
| Mwenja | Framework for securing wireless local area network | |
| Meade | Guidelines for the development and evaluation of IEEE 802.11 intrusion detection systems (IDS) | |
| Roth | Enterprise implementations of wireless network technologies at the Naval Postgraduate School and other military educational institutions | |
| Idris et al. | Wireless Local Area Network (LAN) Security Guideline | |
| Tay | Wireless LAN extension | |
| Webb | Wireless local area network security: an investigation into security tool usage in wireless networks | |
| Ilyas et al. | Indict: Intruder detection, identification, containment and termination | |
| Hyder | Wireless Handheld Solution for the Gaming Industry | |
| Kessel et al. | Wireless local area network (WLAN) vulnerability assessment and security | |
| van Rensburg | An investigation into the deployment of IEEE 802.11 networks |