Mostrando 3 resultados de: 3
Filtros aplicados
Publisher
Communications in Computer and Information Science(1)
Information Technology Journal(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Enhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusSecurity requirements prioritization based on threat modeling and valuation graph
Conference ObjectAbstract: Information systems manage assets that are critical for the business processes of organizations. ThePalabras claves:Security Requirement Prioritization, Threat modelingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusSpecification-based intrusion detection system for WiBro
Conference ObjectAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wirePalabras claves:information security, intrusion detection, Specification, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun YooFuentes:googlescopus