1 |
Kyu Won Lee, Jae Won Ji, Hyun Woo Chun, Sang-jo Youk, "Traffic Analysis Technique for Intrusion Detectionin in Wireless Network", Journal of Security Engineering, Vol. 7, No. 6, 2010. 12.
|
2 |
Jong-Ho Lee, "Wireless-LAN Security Protocol", Kyohacsa, 2005. 08.
|
3 |
Tae-Kyung Kim, "A Study on the Authentication Mechanism for Wireless Mesh Network", Journal of The Korea Society of Digital Industry & Information Management, Vol. 5, No. 2, 2009. 09.
|
4 |
IEEE, "Wireless Medium Access Control (MAC) and physical layer (PHY) specification", IEEE Std 802.11, 1999.
|
5 |
Matthew S. Gast, "802.11 Wireless Networks; The Definitive Guide", O'Reilly Networking, 2002. 04.
|
6 |
"Wireless Fidelity (WiFi) Technology". ITAA. January 2004. Retrieved 2009-11-30.
|
7 |
Si-Choon Noh, "A Designing Method of Network Security Infrastructure", Journal of The Korea Society of Digital Industry & Information Management, Vol. 2, No. 2, 2006. 06.
|
8 |
IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2007 revision). IEEE-SA. 2007. 06.
|
9 |
Hyun-Chul Jung, Hee-jo Lee, "Study on Security Reinforcement Method by Wireless Security Status Survey and Analysis", Spring Conference on Process ing Society, Vol. 13, No. 1, 2006. 05.
|
10 |
Dong-Hoon Shine, Dong-Myung Shin, Kyoung-Hee Ko "Research preventative measures Wireless-LAN Security incident" Autumn Conference on Korea Institute of Information Scientists and Engneers Vol. 31, No. 2, 2004.
|
11 |
NIST 800-97 Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i.
|