[go: up one dir, main page]

Yevdokymenko et al., 2019 - Google Patents

Overview of the Course in “Wireless and Mobile Security”

Yevdokymenko et al., 2019

View PDF
Document ID
4681455498417718614
Author
Yevdokymenko M
Sokolov V
Publication year
Publication venue
Educating the Next Generation MSc in Cyber Security

External Links

Snippet

This paper provides an overview of “Wireless and Mobile Security” course. The course offers practical study of security issues and features concerning wireless security. The program of the course effciently interleaves systematic theoretical knowledge and practical work. The …
Continue reading at elibrary.kubg.edu.ua (PDF) (other versions)

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02E60/70Systems integrating technologies related to power network operation and communication or information technologies mediating in the improvement of the carbon footprint of electrical power generation, transmission or distribution, i.e. smart grids as enabling technology in the energy generation sector not used, see subgroups
    • Y02E60/72Systems characterised by the monitored, controlled or operated power network elements or equipments not used, see subgroups
    • Y02E60/723Systems characterised by the monitored, controlled or operated power network elements or equipments not used, see subgroups the elements or equipments being or involving electric power substations
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring

Similar Documents

Publication Publication Date Title
Karygiannis et al. Wireless Network Security:.
Waliullah et al. Wireless LAN security threats & vulnerabilities
Jang et al. Catch me if you can: Rogue access point detection using intentional channel interference
Sobh Wi-Fi networks security and accessing control
Gupta et al. Wireless hacking
Guo Survey on wifi infrastructure attacks
Thankappan et al. A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks
Ma et al. RAP: Protecting commodity wi-fi networks from rogue access points
Miloslavskaya et al. Ensuring information security for internet of things
Berghel et al. Wireless infidelity II: airjacking
Yevdokymenko et al. Overview of the Course in “Wireless and Mobile Security”
Scarfone et al. Guide to securing legacy IEEE 802.11 wireless networks
Shourbaji et al. Wireless intrusion detection systems (WIDS)
Metwally et al. Detecting semantic social engineering attack in the context of information security
Al-Gharabally et al. Wireless honeypots: survey and assessment
Razak et al. A Preliminary Analysis of Bluetooth and Wi-Fi Security in Residential IoT Ecosystems
Helling Home network security
Myrtaj Deauthentication Attacks, Rogue and Fake Wireless Access Points Detection Through Fingerprinting
Scarfone et al. Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT)
Alabady et al. ENHANCING WIRELESS NETWORK SECURITY VIA ETHICAL HACKING: STRATEGIES AND BEST PRACTICES.
Liang et al. The practical risk assessment for enterprise Wireless Local Area Network
Ainuaimi Detection and analyzing the deauthentication dos attacks on homewireless networks using scapy
Lawton Fighting intrusions into wireless networks
Zaman et al. Implementation of some enhancements in wireless network security by finding vulnerabilities, threats and attacks
Rassam Security of Wi-Fi Networks