Wireless network security: Vulnerabilities, threats and countermeasures

被引:0
|
作者
Choi, Min-Kyu [1 ]
Robles, Rosslin John [1 ]
Hong, Chang-Hwa [1 ]
Kim, Tai-Hoon [1 ]
机构
[1] School of Multimedia, Hannam University, Daejeon, Korea, Republic of
关键词
12;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:77 / 86
相关论文
共 50 条
  • [1] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [2] Wireless security: Vulnerabilities and countermeasures
    Johnson, DM
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 91 - 91
  • [3] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777
  • [4] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48
  • [5] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [6] Wireless LAN Security Threats & Vulnerabilities: A Literature Review
    Waliullah, Md.
    Gan, Diane
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 176 - 183
  • [7] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [8] Wireless Network Security Vulnerabilities and Concerns
    Mushtaq, Ahmad
    SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY, 2010, 122 : 207 - 219
  • [9] Experiments and countermeasures of security vulnerabilities on next generation network
    Kim, Jeong-Wook
    Cho, Hyug-Hyun
    Mun, Gil-Jong
    Seo, Jae-Hyun
    Noh, Bong-Nam
    Kim, Yong-Min
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 562 - +
  • [10] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Hu, Yiwen
    Wang, Sihan
    Tu, Guan-Hua
    Xiao, Li
    Xie, Tian
    Lei, Xinyu
    Li, Chi-Yu
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100