Interconnections (2nd ed.): bridges, routers, switches, and internetworking protocols
Interconnections (2nd ed.): bridges, routers, switches, and internetworking protocols
An algorithm for distributed computation of a spanningtree in an extended LAN
SIGCOMM '85 Proceedings of the ninth symposium on Data communications
Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model
PWC '02 Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications
An empirical analysis of the IEEE 802.11 MAC layer handoff process
ACM SIGCOMM Computer Communication Review
Fast handovers and context transfers in mobile networks
ACM SIGCOMM Computer Communication Review - Special issue on wireless extensions to the internet
Characterizing mobility and network usage in a corporate wireless local-area network
Proceedings of the 1st international conference on Mobile systems, applications and services
Active networks privacy protection and vulnerabilities
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Dissolving active networks privacy threats and vulnerabilities
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
In this paper we design and implement the system that diagnoses security vulnerability in wireless Internet networks. The aim of the paper is to interpret the communication network related to security vulnerability reporting process, and focuses on how the information of a vulnerability is received and processed and how the information is managed after the reception in wireless Internet networks.