References
- M. Al-Zoube, S. Abou El-Seoud, and M. F. Wyne, "Cloud computing based e-learning system," Int. J. Distance Educ. Technol. IJDET, vol. 8, no. 2, pp. 58-71, 2010. https://doi.org/10.4018/jdet.2010040105
- M. J. Kavis, Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons, 2014.
- R. Von Solms and J. Van Niekerk, "From information security to cyber security," Comput. Secur., vol. 38, pp. 97-102, 2013. https://doi.org/10.1016/j.cose.2013.04.004
- J. V. Gaud and M. M. Bartere, "Data Security Based on LAN Using Distributed Firewall," Int. J. Comput. Sci. Mob. Comput., 2014.
- L. Hansen and H. Nissenbaum, "Digital disaster, cyber security, and the Copenhagen School," Int. Stud. Q., vol. 53, no. 4, pp. 1155-1175, 2009. https://doi.org/10.1111/j.1468-2478.2009.00572.x
- N. A. Sales, "Regulating cyber-security," Nw UL Rev, vol. 107, p. 1503, 2012.
- M. Junaid, M. Mufti, and M. U. Ilyas, "Vulnerabilities of IEEE 802.11 i wireless LAN CCMP protocol," Trans. Eng. Comput. Technol., vol. 11, pp. 228-233, 2006.
- J. W. Branch, N. L. Petroni, L. Van Doorn, and D. Safford, "Autonomic 802.11 wireless LAN security auditing," IEEE Secur. Priv., vol. 2, no. 3, pp. 56-65, 2004. https://doi.org/10.1109/MSP.2004.4
- S. Miehlke et al., "Efficacy and safety of budesonide, vs mesalazine or placebo, as induction therapy for lymphocytic colitis," Gastroenterology, vol. 155, no. 6, pp. 1795-1804, 2018. https://doi.org/10.1053/j.gastro.2018.08.042
- J.-C. Chen, M.-C. Jiang, and Y. Liu, "Wireless LAN security and IEEE 802.11 i," IEEE Wirel. Commun., vol. 12, no. 1, pp. 27-36, 2005. https://doi.org/10.1109/MWC.2005.1404570
- D. E. Denning and P. J. Denning, "Data security," ACM Comput. Surv. CSUR, vol. 11, no. 3, pp. 227-249, 1979. https://doi.org/10.1145/356778.356782
- J. V. Gaud and M. B. Mahip, "Data security based on LAN using distributed firewalls," Int. J. Comput. Sci. Mob. Comput., 2014.
- U. Lamping and E. Warnicke, "Wireshark user's guide," Interface, vol. 4, no. 6, p. 1, 2004.
- P. Zhang and K. Xia, "Custom Protocol Analysis Based on Wireshark".
- B. P. Miller, "Vulnerability assessment of open source wireshark and chrome browser," WISCONSIN UNIV MADISON, 2013.
- "3.3.1. Network Security challenges - Barbaadachiisaa Google." https://www.google.com/search? (accessed Sep. 08, 2021).
- "Network Security Challenges & Threats | Vital IT Security Issues." https://www.firemon.com/networksecurity-threats-challenges/ (accessed Sep. 08, 2021).
- "End to End Communication - an overview | ScienceDirect Topics." https://www.sciencedirect.com/topics/computerscience/end-to-end-communication (accessed Sep. 08, 2021).
- "Network Security a Overview." https://www.tutorialspoint.com/network_security/network_security_overview.htm (accessed Sep. 08, 2021).
- C. H. Sandeep, V. Thirupathi, P. Pramod kumar, and S. Naresh kumar, "Goals and Model of Network Security," Int. J. Adv. Sci. Technol., vol. 28, no. 20, pp. 593-599, 2019.
- I. A. Sumra, H. B. Hasbullah, and J. B. AbManan, "Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey," in Vehicular Ad-Hoc Networks for Smart Cities, Springer, 2015, pp. 51-61.