A Taxonomy of Computer Attacks with Applications to Wireless Networks
The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed with th...
Main Author: | Lough, Daniel Lowry |
---|---|
Other Authors: | Electrical and Computer Engineering |
Format: | Others |
Published: |
Virginia Tech
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10919/27242 http://scholar.lib.vt.edu/theses/available/etd-04252001-234145/ |
Similar Items
-
Attacks on IEEE 802.11 wireless networks
by: Dejan Milan Tepšić, et al.
Published: (2013-06-01) -
Wireless LAN security.
Published: (2005) -
Wireless network security: design considerations for an enterprise network
by: Oh, Khoon Wee
Published: (Dece) -
Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks
by: Zhang, Zhiguo
Published: (2008) -
Wireless Intrusion Detection Sytem
by: Vigo, John Louis, Jr.
Published: (2004)