Yevdokymenko et al., 2019 - Google Patents
Overview of the Course in “Wireless and Mobile Security”Yevdokymenko et al., 2019
View PDF- Document ID
- 4681455498417718614
- Author
- Yevdokymenko M
- Sokolov V
- Publication year
- Publication venue
- Educating the Next Generation MSc in Cyber Security
External Links
Snippet
This paper provides an overview of “Wireless and Mobile Security” course. The course offers practical study of security issues and features concerning wireless security. The program of the course effciently interleaves systematic theoretical knowledge and practical work. The …
- 241001170774 Maryna 0 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E60/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02E60/70—Systems integrating technologies related to power network operation and communication or information technologies mediating in the improvement of the carbon footprint of electrical power generation, transmission or distribution, i.e. smart grids as enabling technology in the energy generation sector not used, see subgroups
- Y02E60/72—Systems characterised by the monitored, controlled or operated power network elements or equipments not used, see subgroups
- Y02E60/723—Systems characterised by the monitored, controlled or operated power network elements or equipments not used, see subgroups the elements or equipments being or involving electric power substations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karygiannis et al. | Wireless Network Security:. | |
Waliullah et al. | Wireless LAN security threats & vulnerabilities | |
Jang et al. | Catch me if you can: Rogue access point detection using intentional channel interference | |
Sobh | Wi-Fi networks security and accessing control | |
Gupta et al. | Wireless hacking | |
Guo | Survey on wifi infrastructure attacks | |
Thankappan et al. | A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks | |
Ma et al. | RAP: Protecting commodity wi-fi networks from rogue access points | |
Miloslavskaya et al. | Ensuring information security for internet of things | |
Berghel et al. | Wireless infidelity II: airjacking | |
Yevdokymenko et al. | Overview of the Course in “Wireless and Mobile Security” | |
Scarfone et al. | Guide to securing legacy IEEE 802.11 wireless networks | |
Shourbaji et al. | Wireless intrusion detection systems (WIDS) | |
Metwally et al. | Detecting semantic social engineering attack in the context of information security | |
Al-Gharabally et al. | Wireless honeypots: survey and assessment | |
Razak et al. | A Preliminary Analysis of Bluetooth and Wi-Fi Security in Residential IoT Ecosystems | |
Helling | Home network security | |
Myrtaj | Deauthentication Attacks, Rogue and Fake Wireless Access Points Detection Through Fingerprinting | |
Scarfone et al. | Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT) | |
Alabady et al. | ENHANCING WIRELESS NETWORK SECURITY VIA ETHICAL HACKING: STRATEGIES AND BEST PRACTICES. | |
Liang et al. | The practical risk assessment for enterprise Wireless Local Area Network | |
Ainuaimi | Detection and analyzing the deauthentication dos attacks on homewireless networks using scapy | |
Lawton | Fighting intrusions into wireless networks | |
Zaman et al. | Implementation of some enhancements in wireless network security by finding vulnerabilities, threats and attacks | |
Rassam | Security of Wi-Fi Networks |