[go: up one dir, main page]

Iheagwara et al., 2005 - Google Patents

Architectural and functional issues in systems requirements specifications for wireless intrusion detection systems implementation

Iheagwara et al., 2005

Document ID
8298057048865369709
Author
Iheagwara C
Blyth A
Bennett M
Publication year
Publication venue
2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)

External Links

Snippet

The task of detecting, repulsing and preventing attacks in wireless environments is becoming more and more difficult as a result of several factors including defective design and improper requirements specification of wireless intrusion detection systems. Systems …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks

Similar Documents

Publication Publication Date Title
US7907565B2 (en) System and method for managing wireless devices in an enterprise
Karygiannis et al. Wireless Network Security:.
US7860253B2 (en) Wireless perimeter security device and network using same
US20060072527A1 (en) Secure authentication and network management system for wireless LAN applications
Noor et al. Wireless networks: developments, threats and countermeasures
US20190387408A1 (en) Wireless access node detecting method, wireless network detecting system and server
Banerjee et al. A review on different Intrusion Detection Systems for MANET and its vulnerabilities
Scarfone et al. Guide to securing legacy IEEE 802.11 wireless networks
Iheagwara et al. Architectural and functional issues in systems requirements specifications for wireless intrusion detection systems implementation
Shourbaji et al. Wireless intrusion detection systems (WIDS)
Scarfone et al. Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT)
Mahrenholz et al. Detecting Low-Level Attacks on Wireless OT Networks
Vijayalakshmi Genetic Algorithms for Wireless Network Security
Scarfone et al. Sp 800-48 rev. 1. guide to securing legacy ieee 802.11 wireless networks
Nand Developing a theory of portable public key infrastructure (PORTABLEPKI) for mobile business security
Mwenja Framework for securing wireless local area network
Meade Guidelines for the development and evaluation of IEEE 802.11 intrusion detection systems (IDS)
Roth Enterprise implementations of wireless network technologies at the Naval Postgraduate School and other military educational institutions
Idris et al. Wireless Local Area Network (LAN) Security Guideline
Tay Wireless LAN extension
Webb Wireless local area network security: an investigation into security tool usage in wireless networks
Ilyas et al. Indict: Intruder detection, identification, containment and termination
Hyder Wireless Handheld Solution for the Gaming Industry
Kessel et al. Wireless local area network (WLAN) vulnerability assessment and security
van Rensburg An investigation into the deployment of IEEE 802.11 networks