Добірка наукової літератури з теми "Wireless security networks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Wireless security networks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Wireless security networks"
Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Повний текст джерелаSingh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (October 25, 2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.
Повний текст джерелаHari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (December 20, 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Повний текст джерелаHadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.
Повний текст джерелаABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.
Повний текст джерелаChen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.
Повний текст джерелаP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.
Повний текст джерелаP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.
Повний текст джерелаKumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.
Повний текст джерелаPrabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 19, 2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.
Повний текст джерелаДисертації з теми "Wireless security networks"
GHUMMAN, SHAKEEL AHMAD. "Security in Wireless Mesh Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4175.
Повний текст джерелаThe Master’s thesis report describes the wireless mesh networks functions,
characteristics, network management and finally different protocols with security issues and applications. Wireless Networks (WMNs) are replacing wireless Infrastructure networks in many areas because of their lower and higher flexibility. The wireless mesh networks (WMNs) provides network access for both mesh and conventional clients through mesh routers and mesh clients. Communication across the network is formed via the bridge functions. Mesh router also provides the minimal mobility and form the backbone of WMNs.
Wireless mesh network has resolved the limitation of ad hoc networks which is ultimately improves the performance of Ad hoc networks. Security is a very important issue which can be resolve through proper management of network. The improvment of 802.11i security has greatly improved the network perfomance and increase the encryption and integrity security capabilities. The key points which are being addressed in this report are security issues and threats and their counter measures. Attacks which can come on diffent layers are being discussed in this survey. Security of wireless mesh network is still under consideration. Wireless mesh network are attracting more attention due to its enhanced features.
Wireless mesh network topology technology is being discussed in this report. Then network management of WMNs is explained and in the concluding chapters security issues are discussed. Threats, attacks and challenges of WMNs are discussed in this survey.
Jiang, Shu. "Efficient network camouflaging in wireless networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3067.
Повний текст джерелаBradford, Bryan L. "Wireless security within hastily formed networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBradford.pdf.
Повний текст джерелаThesis Advisor(s): Carl Oros. "September 206." Includes bibliographical references (p. 69-70). Also available in print.
Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Повний текст джерелаDe, Wit Roland Duyvené. "Provisioning VolP wireless networks with security." Thesis, Bloemfontein : Central University of Technology, Free State, 2008. http://hdl.handle.net/11462/47.
Повний текст джерелаHarbin, James R. "Security strategies in wireless sensor networks." Thesis, University of York, 2011. http://etheses.whiterose.ac.uk/2103/.
Повний текст джерелаAbuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.
Повний текст джерелаLim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.
Повний текст джерелаSANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.
Повний текст джерелаFowler, James D. "Security planning for wireless networks : DoD concerns." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362720.
Повний текст джерелаThesis advisor(s): Cynthia E. Irvine, Douglas Brinkley. "March 1999". Includes bibliographical references. Also available online.
Книги з теми "Wireless security networks"
Khan, Shafiullah, and Al-Sakib Khan Pathan, eds. Wireless Networks and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36169-2.
Повний текст джерелаZhang, Yan. Security in wireless mesh networks. Boca Raton, FL: Auerbach Publications, 2007.
Знайти повний текст джерелаOreku, George S., and Tamara Pazynyuk. Security in Wireless Sensor Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-21269-2.
Повний текст джерелаKrishna, Sankar, ed. Cisco wireless LAN security. Indianapolis, IN: Cisco, 2005.
Знайти повний текст джерелаDavid, Pollino, and NetLibrary Inc, eds. Wireless security. New York: McGraw-Hill/Osborne, 2002.
Знайти повний текст джерелаPraphul, Chandra, ed. Wireless security. Amsterdam: Newnes/Elsevier, 2009.
Знайти повний текст джерелаMahmoud, Mohamed M. E. A., and Xuemin Shen. Security for Multi-hop Wireless Networks. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04603-7.
Повний текст джерелаSchäfer, Günter. Security in Fixed and Wireless Networks. Chichester, UK: John Wiley & Sons, Ltd, 2003. http://dx.doi.org/10.1002/0470863722.
Повний текст джерелаAnjum, Farooq, and Petros Mouchtaris. Security for Wireless Ad Hoc Networks. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/0470118474.
Повний текст джерелаPetros, Mouchtaris, and Wiley online library, eds. Security for wireless ad hoc networks. Hoboken, N.J: Wiley-Interscience, 2007.
Знайти повний текст джерелаЧастини книг з теми "Wireless security networks"
Seon Hong, Choong, Latif U. Khan, Mingzhe Chen, Dawei Chen, Walid Saad, and Zhu Han. "Security and Privacy." In Wireless Networks, 129–41. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4963-9_5.
Повний текст джерелаHolt, Alan, and Chi-Yu Huang. "Wireless Security." In Computer Communications and Networks, 101–10. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-275-9_6.
Повний текст джерелаChen, Shanzhi, Jinling Hu, Li Zhao, Rui Zhao, Jiayi Fang, Yan Shi, and Hui Xu. "C-V2X Security Technology." In Wireless Networks, 271–308. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5130-5_7.
Повний текст джерелаZhang, Peng, and Chuang Lin. "Security Threats in Network Coding." In Wireless Networks, 9–19. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31083-1_2.
Повний текст джерелаWu, Jiangxing. "Security Risks from Vulnerabilities and Backdoors." In Wireless Networks, 3–38. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29844-9_1.
Повний текст джерелаZhang, Kuan, and Xuemin Shen. "Security and Privacy Challenges in MHN." In Wireless Networks, 11–20. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24717-5_2.
Повний текст джерелаSelmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. "Security in WSNs." In Wireless Sensor Networks, 83–115. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6_4.
Повний текст джерелаZou, Yulong, and Jia Zhu. "Security-Reliability Tradeoff for Cooperative Relay Networks." In Wireless Networks, 53–71. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31174-6_4.
Повний текст джерелаLei, Wan, Anthony C. K. Soong, Liu Jianghua, Wu Yong, Brian Classon, Weimin Xiao, David Mazzarese, Zhao Yang, and Tony Saboorian. "5G Security System Design for All Ages." In Wireless Networks, 341–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73703-0_6.
Повний текст джерелаBrecht, Benedikt, and Thorsten Hehn. "A Security Credential Management System for V2X Communications." In Wireless Networks, 83–115. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94785-3_4.
Повний текст джерелаТези доповідей конференцій з теми "Wireless security networks"
J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.
Повний текст джерелаVieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa, and Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.
Повний текст джерелаPaavola, Jarkko, Tuomo Rautava, Juhani Hallio, Juha Kalliovaara, and Tero Jokela. "Use of wireless communication networks in digitalization of factory environments." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10050.
Повний текст джерелаMartinovic, Ivan, Nicos Gollan, and Jens B. Schmitt. "Firewalling wireless sensor networks: Security by wireless." In 2008 33rd IEEE Conference on Local Computer Networks (LCN 2008). IEEE, 2008. http://dx.doi.org/10.1109/lcn.2008.4664279.
Повний текст джерелаBurgner, Daniel E., and Luay A. Wahsheh. "Security of Wireless Sensor Networks." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.62.
Повний текст джерелаAl-Ka'bi, Amin H. "Security in mobile wireless networks." In 2013 International Conference on Signal Processing and Communication (ICSC). IEEE, 2013. http://dx.doi.org/10.1109/icspcom.2013.6719746.
Повний текст джерелаJohnson, Ashley, Joseph Molloy, Jonathan Yunes, Joseph Puthuparampil, and Abdelrahman Elleithy. "Security in Wireless Sensors Networks." In 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2019. http://dx.doi.org/10.1109/lisat.2019.8817338.
Повний текст джерелаLarsson, Andreas, and Philippas Tsigas. "Security in Wireless Sensor Networks." In 2011 Seventh European Conference on Computer Network Defense (EC2ND). IEEE, 2011. http://dx.doi.org/10.1109/ec2nd.2011.13.
Повний текст джерелаKasimov, S. S., E. N. Bugibaev, and S. D. Arzikulov. "Wireless networks and information security." In 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE, 2007. http://dx.doi.org/10.1109/canet.2007.4401684.
Повний текст джерелаWang, Yilin, and Maosheng Qin. "Security for wireless sensor networks." In 2010 International Conference on Control, Automation and Systems (ICCAS 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccas.2010.5669748.
Повний текст джерелаЗвіти організацій з теми "Wireless security networks"
Frankel, S. E., B. Eydt, L. Owens, and K. A. Scarfone. Establishing wireless robust security networks :. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-97.
Повний текст джерелаSouppaya, M. P., and K. A. Scarfone. Guidelines for securing Wireless Local Area Networks (WLANs). Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-153.
Повний текст джерелаScarfone, K. A., D. Dicoi, M. Sexton, and C. Tibbs. Guide to securing legacy IEEE 802.11 wireless networks. Gaithersburg, MD: National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-48r1.
Повний текст джерелаSkalka, Christian. A Language-Based Approach To Wireless Sensor Network Security. Fort Belvoir, VA: Defense Technical Information Center, March 2014. http://dx.doi.org/10.21236/ada597308.
Повний текст джерела