Back to Results
First PageMeta Content
Access control / Computer network security / Data security / Computer security / Wireless security / Role-based access control / Mobile / Wireless intrusion prevention system / Framework Programmes for Research and Technological Development / Wireless networking / Security / Technology


WIPS 구성도 같은 그림 추가
Add to Reading List

Document Date: 2014-08-28 09:04:16


Open Document

File Size: 2,21 MB

Share Result on Facebook

City

perm / Contextual Role / Article / /

Company

Information Processing Systems / Applied Mathematics Algebra Hindawi Publishing Corporation / Volume 2014 The Scientific World Journal Hindawi Publishing Corporation / E. Georgakakis S. A. / Decision Sciences Hindawi Publishing Corporation / Ge / Demerits Difficult / General wireless / IEEE Press / Creative Commons / Hindawi Publishing Corporation / Operations Research Hindawi Publishing Corporation / Applied Analysis Volume 2014 Hindawi Publishing Corporation / /

Country

Korea / /

/

Facility

Dongguk University / Seoul National University of Science / Sun Moon University / Dankook University / /

IndustryTerm

area networks / user devices / mobile computing environment / wireless attacks / malicious devices / human-centric computing / wireless spaces / human-centric computing environment / Mobile computing environments / pervasive computing / diverse wireless devices / wireless attack tools / Wireless intrusion prevention system / wireless network / Wireless IPSs / described wireless security threats / humancentric computing environment / important advanced technologies / Wireless Communications / illegal devices / mobile business devices / diverse mobile devices / finance / wireless signals / universal security systems / proactive wireless intrusion detection system / short message service technology / wireless networks / wired/wireless / office environment using mobile devices / wireless network environments / wire/wireless / wireless intrusion prevention techniques / business work using mobile devices / wireless terminals / wireless device detection / wireless environments / ad hoc networks / wireless sniffing / wireless attack detection / Wireless IDSs / wireless security threats / social life using mobile devices / intrusion prevention systems / instruction detection systems / wireless networks increases / mobile devices / individual mobile devices / described core technologies / wireless intrusion prevention systems / mobile social networks / wireless transport / wireless access / wireless communication using mobile devices / Wireless Security / recognition-based wireless / wireless devices / wireless communication transmission / device manufacturer / /

Movie

Man in the Middle / /

OperatingSystem

DoS / /

Organization

Seoul National University / Department of Computer Science and Engineering / Dankook University / vol. / Communications Policy Research Center / Dongguk University / Seoul / Department of Multimedia Engineering / Ministry of Science / Korea Communications Agency / IEEE Computer Society / Department of Computer Engineering / /

Person

MO AP / A. U. Bandaranayake / V / Jong Hyuk Park / Jong Hyuk / /

Position

Academic Editor / administrator / /

Product

RBAC / /

Technology

WEP / wireless devices / Information Technology / mobile IT technologies / Wireless Communications / MAC address / mobile device / using short message service technology / Mobile Devices / wireless access / WLAN / firewall / wireless device / smartphones / Mobile computing / http / local area networks / /

URL

http /

SocialTag