1 |
S. Khan, N, Mast, K. K. Loo, and A. Silahuddin, "Cloned Access Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mash Networks," Journal of Information Assurance and Security(JIAS), ISSN: 1554-1010, Vol.3, No.4, pp.257-262, 2008(12).
|
2 |
"IEEE Standard for Information technology-Telecommunication and information exchange between systems-Local and metropolitan area netwokrs-Specific requirements Part 11 :Wireless LAN Medium Access Control (MAC) Security Enhancements," IEEE Std 802.11i-2004, pp.1-175, 2004.
|
3 |
IEEE802.11, "Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specification," 2007(6).
|
4 |
Network Research Group, Lawrence Berkeley Nation Laboratory Network simulator version 2(NS-2) URL: http://www.isi.edu/nsman/ns
|
5 |
전용희, “침입방지시스템(IPS)의 기술 분석 및 성능평가 방안”, 정보보호학회지, 제15권, 제2호, pp63-73, 2005.
과학기술학회마을
|
6 |
이형우, 최창원, “무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발”, 한국콘텐츠학회논문지, Vol.6, No.12, pp29-39, 2006.
과학기술학회마을
|
7 |
고윤미, 김진희, 권경희, “IEEE 802,11 네트워크에서의 복제된 AP 탐지 공격으로 부터의 방어 대책”, 한국 정보처리학회 추계학술발표대회 논문집, 제16권, 제2호, 2009(11).
|
8 |
S. Kahn. K-k.Loo, T. Naeem, and M. A. Khan, "Denial of service attacks and challenges in broadband wireless network," International Journal of Computer Science and Network Security, Vol.8, No.7, pp.1-6, 2008(7).
|
9 |
R. Cenkatesha Prasad, P. Pqwtczak, J. A. Hoffmeyer, and H. S. Berger, "Cognitive functionality in next generation wireless networks: Standardization efforts," IEEE Communication Magazine, Vol.46, Issue4, pp.72-78, 2008(4).
|
10 |
Rakesh Shrestha, S. D. Lee, D. Y. Choi, and S.J. Han, "Detecting jamming attacks in MANET,한국 해양정보통신학회논문지, 제13권, 제3호, pp.482-488.
과학기술학회마을
|
11 |
F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access point vulnerabilities to DoS attacks in 802.11 networks," IEEE wireless Communications and Networking Conference, Vol.14, Issue2, pp159-169, 2008(3).
|