Wireless security: Vulnerabilities and countermeasures

被引:0
|
作者
Johnson, DM
机构
关键词
D O I
10.1109/CSAC.2002.1176282
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The panel session will cover current issues and problems in wireless security and approaches to dealing with them.
引用
收藏
页码:91 / 91
页数:1
相关论文
共 50 条
  • [31] Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network(EPON)
    Stamatios V.Kartalopoulos
    Pramode K.Verma
    中国通信, 2007, 4 (03) : 17 - 29
  • [32] Jamming at Terahertz Frequencies: Security Vulnerabilities of Wireless Links
    Guerboukha, Hichem
    Shrestha, Rabi
    Fang, Zhaoji
    Knightly, Edward
    Mittleman, Daniel M.
    2022 47TH INTERNATIONAL CONFERENCE ON INFRARED, MILLIMETER AND TERAHERTZ WAVES (IRMMW-THZ 2022), 2022,
  • [33] SECURITY VULNERABILITIES AND RISKS IN INDUSTRIAL USAGE OF WIRELESS COMMUNICATION
    Plosz, S.
    Farshad, A.
    Tauber, M.
    Lesjak, C.
    Ruprechter, T.
    Pereira, N.
    2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA), 2014,
  • [34] Security Vulnerabilities of Server-Centric Wireless Datacenters
    Mamun, Sayed Ashraf
    Ganguly, Amlan
    Markopoulos, Panos P.
    Kwasinski, Andres
    Kwon, Minseok
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [35] Jamming at Terahertz Frequencies: Security Vulnerabilities of Wireless Links
    Guerboukha, Hichem
    Shrestha, Rabi
    Fang, Zhaoji
    Knightly, Edward
    Mittleman, Daniel M.
    International Conference on Infrared, Millimeter, and Terahertz Waves, IRMMW-THz, 2022, 2022-August
  • [36] Wireless LAN Security Threats & Vulnerabilities: A Literature Review
    Waliullah, Md.
    Gan, Diane
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 176 - 183
  • [37] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Hu, Yiwen
    Wang, Sihan
    Tu, Guan-Hua
    Xiao, Li
    Xie, Tian
    Lei, Xinyu
    Li, Chi-Yu
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100
  • [38] A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
    Farhadi, Mozhdeh
    Lanet, Jean-Louis
    Pierre, Guillaume
    Miorandi, Daniele
    SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (06): : 973 - 997
  • [39] Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review
    Yaqoob, Tehreem
    Abbas, Haider
    Atiquzzaman, Mohammed
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3723 - 3768
  • [40] Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks
    Giaretta, Alberto
    Balasubramaniam, Sasitharan
    Conti, Mauro
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 665 - 676