과제정보
연구 과제 주관 기관 : 한국연구재단
참고문헌
- Kim Ji-an, 2014, "wireless Network Security Threat Countermeasures WIPS," Available:http://www.boannews.com/media/view.asp?idx=39719
- A. Scarfo, "New security perspectives around BYOD," Proc. 7th Int. Conf. Broadband, Wireless Computing, Commun., Applicat. (BWCCA), pp. 446- 451, Victoria, Canada, Nov. 2012.
- Robert Mitchell, Ing-Ray Chen, "A survey of intrusion detection in wireless network applications," Journal Computer Communications archive Volume 42 pp. 1-23, Apr. 2014.
- Jungsoo Park, Minho Park, Souhwan Jung, A whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device, KICS 13-08, Vol. 38B, Aug. 2013. https://doi.org/10.7840/kics.2013.38B.8.632
- AirTight Network, "Airtight network wireless security," AirTight White Paper, 2012.
- Lee Gi Hyouk, Young Jae Dong, "A Study on the Construction instance of the Wireless Intrusion Prevention System for illegal AP detection threat preventions," Proc. of Symposium of the Korean Institute of communications and information Sciences, pp. 1004-1015, November, 2008
- Md. Waliullah, Diane Gan, "Wireless LAN Security Threats & Vulnerabilities : A Literature Review," International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 5, No. 1, 2014.
- Sushma, Deepak Nandal, Vikas Nanda, "Security Threats in Wireless Sensor Networks," International Journal of Computer Science & Management Studies(IJCSMS), Vol. 11, Issue 01, May 2011.
- Bellardo J, Savage S, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," USENIX security (pp. 15-28), Aug. 2003.
- Aslam, Baber, M. Hasan Islam, and Shoab A. Khan, "802.11 disassociation DoS Attack and its solutions: A survey," Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006, Proc. of the First. IEEE, 2006, Sep. 2006.
- Onat I, Miri A, "An intrusion detection system for wireless Sensor networks," WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005, Vol. 3, pp. 253-259. IEEE, Aug, 2005.
- Karen Scarfone, "Comparing the top wireless intrusion prevention systems," Wireless intrusion prevention systems: A buyer's guide, Scarfone Cybersecurity, 2016.
- Han-Kil Kim, Su-Jin Kim, Hwan-Kyu Lee, Hoekyung Jung, Light-weight System Design & Implementation for Wireless Intrusion Detection System, Journal of the Korea Institute of informaion and, Vol. 18, No. 3, pp. 602-608, Mar. 2014. https://doi.org/10.6109/jkiice.2014.18.3.602
- Woo-Hyuk Jung, Seung-hyung Lee, "Detecting and responding to security attacks about AP, The Journal of The Korean Institute of Communication Sciences," 2016.
- Sansung, "Samsung wireless Enterprise sanmsung security AP, WHITE PAPER," 2013.