Login / Signup
MOnitoring wlans for man-in-the-middle attacks.
N. L. Harshini
G. Sridhar
V. Sridhar
Published in:
Parallel and Distributed Computing and Networks (2004)
Keyphrases
</>
monitoring system
real time
wireless networks
countermeasures
security threats
malicious attacks
early warning
denial of service attacks
data acquisition
watermarking algorithm
computer security
attack detection