Tackling security vulnerabilities in VPN-based wireless deployments.
Lookman FazalSachin GanuMartin KappesAnjur Sundaresan KrishnakumarParameshwaran KrishnanPublished in: ICC (2004)
Keyphrases
- security vulnerabilities
- dos attacks
- network security
- intrusion detection
- wireless networks
- penetration testing
- mobile ad hoc networks
- security properties
- mobile users
- mobile devices
- mobile networks
- virtual private network
- unauthorized access
- information security
- intrusion detection system
- security policies
- sensitive data
- software architecture
- data mining techniques
- association rules
- database systems
- attack graphs
- data mining