A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security
Berker TasolukZuhal TanrikuluPublished in: CoRR (2011)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- wired networks
- intrusion detection system
- network traffic
- wireless networks
- anomaly detection
- dos attacks
- security breaches
- situation assessment
- security policies
- anti phishing
- risk assessment
- information security
- mobile devices
- machine learning
- wireless communication
- network intrusion
- security protection
- real time
- wireless sensor
- denial of service
- model selection
- packet filtering