09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

References<br />

Aime, M. D., Lioy, A., & Mazzocchi, D. (2004). On the security <strong>of</strong> 802.11 wireless<br />

network. In B. Jerman-Blazic, W. Schneider & T. Klobucar (Eds.), Security and<br />

privacy in advanced networking technologies (pp. 51-100). Amsterdam: IOS<br />

Press.<br />

AirDefense. (2007). Anywhere, anytime wireless protection. Retrieved July 1, 2007,<br />

from http://www.airdefense.net/products/index.php<br />

AirSnare. (2007). Air Snare. Retrieved July 1, 2007, from<br />

http://home.comcast.net/~jay.deboer/airsnare/index.html<br />

Arbaugh, W. A. (2003). Wireless security is different. Computer, 36(8), 99-101.<br />

Arbaugh, W. A., Shankar, N., & Wan, Y. C. J. (2001). Your 802.11 wireless network<br />

has no clothes. Retrieved 10 April, 2006, from<br />

http://www.cs.umd.edu/~waa/wireless.pdf.<br />

Bethala, B., Joshi, A., Phatak, D., Avancha, S., & G<strong>of</strong>f, T. (2002). Design and<br />

Evaluation <strong>of</strong> a Common Access Point for Bluetooth, 802.11 and Wired LANs.<br />

Retrieved June 12, 2007, from<br />

http://ebiquity.umbc.edu/paper/html/id/106/Design-and-Evaluation-<strong>of</strong>-a-<br />

Common-Access-Point-for-Bluetooth-802-11-and-Wired-LANs<br />

Bhagyavati, Summers, W. C., & DeJoie, A. (2004). Wireless security techniques: an<br />

overview Paper presented at the 1st annual conference on information security<br />

curriculum development Kennesaw, Georgia<br />

Bhatt, S., Fujimoto, R., Ogielski, A., & Perumalla, K. (1998). Parallel simulation<br />

techniques for large-scale networks. IEEE communication magazine, 42-46.<br />

Borisov, N., Goldberg, I., & Wagner, D. (2001). Intercepting mobile communications:<br />

the insecurity <strong>of</strong> 802.11 Paper presented at the 7th annual international<br />

conference on mobile computing and networking, Rome, Italy<br />

Breslau, L., Estrin, D., Fall, K., Floyd, S., Heidemann, J., Helmy, A., et al. (2000).<br />

Advances in Network Simulation. IEEE Computer(May), 59-67.<br />

Brown, B. (2003). 802.11: The security difference between b and i. IEEE Potentials,<br />

22(4), 23-27.<br />

Cam-Winget, N., Housley, R., Wagner, D., & Walker, J. (2003). Security Flaws in<br />

802.11 Data Link Protocols. Communications <strong>of</strong> the ACM, 46(5), 35-39.<br />

46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!