1 |
L. Liu, R. Moulic, and D. Shea, "Cloud service portal for mobile device management," in Proc. IEEE 7th Int. Conf. e-Business Eng. (ICEBE), pp. 474-478, Shanghai, China, Nov. 2010.
|
2 |
A. Scarfò, "New security perspectives around BYOD," in Proc. 7th Int. Conf. Broadband, Wireless Computing, Commun., Applicat. (BWCCA), pp. 446-451, Victoria, Canada, Nov. 2012.
|
3 |
G. Chen, H. Yao, and Z. Wang, "An intelligent WLAN intrusion prevention system based on signature detection and plan recognition," In Proc. 2nd Int. Conf. Future Networks (ICFN '10), pp. 168-172, Sanya, China, Jan. 2010.
|
4 |
H.-W. Lee and C.-W. Choi, "Development of malicious traffic detection and prevention system by embedded module on wireless LAN access point," J. Korea Contents Assoc. (KOCON), vol. 6, no. 12, pp. 29-39, Dec. 2006.
과학기술학회마을
|
5 |
H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011.
DOI
ScienceOn
|
6 |
J. Burke, B. Hartselle, B. Kneuven, and B. Morgan, Wireless security attacks and defense, Retrieved May 2006, from http://http://www.windowsecurity.com/whitepapers/Wireless_Security/Wireless-Security-Attacks-Defenses.html.
|
7 |
D. Inoue, R. Nomura, and M. Kuroda, "Transient MAC address scheme for untraceability and DOS attack resiliency on wireless network," in Proc. Wireless Telecommun. Symp., pp. 15-23, Pomona, U.S.A., Apr. 2005.
|
8 |
AirTight Network, "Airtight network wireless security," AirTight White Paper, 2012.
|
9 |
H. Hwang, G. Jung, K. Sohn, and S. Park "A study on MITM(Man in the Middle) vulnerability in wireless network using 802.1X and EAP," in Proc. Int. Conf. Inform. Sci. Security (ICISS '08), pp. 164-170, Hyderabad, India, Jan. 2008.
|