AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
References<br />
Aime, M. D., Lioy, A., & Mazzocchi, D. (2004). On the security <strong>of</strong> 802.11 wireless<br />
network. In B. Jerman-Blazic, W. Schneider & T. Klobucar (Eds.), Security and<br />
privacy in advanced networking technologies (pp. 51-100). Amsterdam: IOS<br />
Press.<br />
AirDefense. (2007). Anywhere, anytime wireless protection. Retrieved July 1, 2007,<br />
from http://www.airdefense.net/products/index.php<br />
AirSnare. (2007). Air Snare. Retrieved July 1, 2007, from<br />
http://home.comcast.net/~jay.deboer/airsnare/index.html<br />
Arbaugh, W. A. (2003). Wireless security is different. Computer, 36(8), 99-101.<br />
Arbaugh, W. A., Shankar, N., & Wan, Y. C. J. (2001). Your 802.11 wireless network<br />
has no clothes. Retrieved 10 April, 2006, from<br />
http://www.cs.umd.edu/~waa/wireless.pdf.<br />
Bethala, B., Joshi, A., Phatak, D., Avancha, S., & G<strong>of</strong>f, T. (2002). Design and<br />
Evaluation <strong>of</strong> a Common Access Point for Bluetooth, 802.11 and Wired LANs.<br />
Retrieved June 12, 2007, from<br />
http://ebiquity.umbc.edu/paper/html/id/106/Design-and-Evaluation-<strong>of</strong>-a-<br />
Common-Access-Point-for-Bluetooth-802-11-and-Wired-LANs<br />
Bhagyavati, Summers, W. C., & DeJoie, A. (2004). Wireless security techniques: an<br />
overview Paper presented at the 1st annual conference on information security<br />
curriculum development Kennesaw, Georgia<br />
Bhatt, S., Fujimoto, R., Ogielski, A., & Perumalla, K. (1998). Parallel simulation<br />
techniques for large-scale networks. IEEE communication magazine, 42-46.<br />
Borisov, N., Goldberg, I., & Wagner, D. (2001). Intercepting mobile communications:<br />
the insecurity <strong>of</strong> 802.11 Paper presented at the 7th annual international<br />
conference on mobile computing and networking, Rome, Italy<br />
Breslau, L., Estrin, D., Fall, K., Floyd, S., Heidemann, J., Helmy, A., et al. (2000).<br />
Advances in Network Simulation. IEEE Computer(May), 59-67.<br />
Brown, B. (2003). 802.11: The security difference between b and i. IEEE Potentials,<br />
22(4), 23-27.<br />
Cam-Winget, N., Housley, R., Wagner, D., & Walker, J. (2003). Security Flaws in<br />
802.11 Data Link Protocols. Communications <strong>of</strong> the ACM, 46(5), 35-39.<br />
46