Fundamentals of computer security technology
Fundamentals of computer security technology
Protection and security on the information superhighway
Protection and security on the information superhighway
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Firewalls and Internet Security: Repelling the Wily Hacker
Firewalls and Internet Security: Repelling the Wily Hacker
A taxonomy of computer attacks with applications to wireless networks
A taxonomy of computer attacks with applications to wireless networks
Wireless Security Is Different
Computer
Business Data Networks and Telecommunications (6th Edition)
Business Data Networks and Telecommunications (6th Edition)
The proactive intrusion prevention for Wireless Local Area Network
International Journal of Mobile Communications
International Journal of Mobile Communications
honeyM: a framework for implementing virtual honeyclients for mobile devices
Proceedings of the third ACM conference on Wireless network security
Security management in Wireless Sensor Networks for healthcare
International Journal of Mobile Communications
An effective AKA protocol for UMTS
International Journal of Mobile Communications
Hi-index | 0.00 |
Despite the abundance of taxonomies for the high-level classification of computer or network security attacks, few researchers have worked on the development of a taxonomy dedicated to Wireless Local Area Network (WLAN) security attacks. The existing general-purpose taxonomies are not equipped with WLAN-specific classification criteria and, therefore, fail to reveal and categorise attacks that exploit vulnerabilities found only in WLANs. To address this problem, we propose a novel taxonomy development framework that features a rich set of classification criteria devoted to WLAN attacks. The new taxonomy is expressive enough to describe not only well-known attacks, but also newly emerging ones.