Login / Signup
The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies.
Jonny Milliken
Alan Marshall
Published in:
SECRYPT (2010)
Keyphrases
</>
lightweight
computer networks
database
network traffic
wireless networks
quality of service
network structure
communication networks
network security
security mechanisms
access points
security measures
wireless local area network