09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Farshchi, J. (2003). Wireless Intrusion Detection Systems. Retrieved June 30, 2007,<br />

from http://www.securityfocus.com/infocus/1742<br />

Fogarty, K. (2005). Eye on 802.11i. Retrieved June 10, 2007, from<br />

http://www.networkworld.com/techinsider/2005/031405tiwireless2.html<br />

Fritz, J. (2004). Network-modelling tools. Network World Retrieved May 10, 2006,<br />

from http://www.techworld.com/networking/features/index.cfm?featureid=938<br />

Gao, Z., & Ansari, N. (2005). Tracing cyber attacks from the practical perspective.<br />

IEEE Communication Magazine, 123-131.<br />

Gast, M. (2002). Wireless LAN Security: A Short History. Retrieved 10 April, 2006,<br />

from http://www.oreillynet.com/pub/a/wireless/2002/04/19/security.html<br />

Geier, J. (2002a). 802.11 WEP: Concepts and vulnerability. Retrieved June 10, 2007,<br />

from http://www.wi-fiplanet.com/tutorials/article.php/1368661<br />

Geier, J. (2002b). Making the Choice: 802.11a or 802.11g. Retrieved June 30, 2007,<br />

from http://www.wi-fiplanet.com/tutorials/article.php/1009431<br />

GloMoSim. (2001). GloMoSim Manual. Retrieved 20 April, 2007, from<br />

http://pcl.cs.ucla.edu/projects/glomosim/GloMoSimManual.html<br />

Goktruk, E. (2006). Towards simulator interoperability and model interreplaceability in<br />

network simulation and emulation through AMINES-HLA Paper presented at the<br />

37th conference on Winter simulation Monterey, California<br />

Haskin, D. (2007). FAQ: 802.11n wireless networking [Electronic Version].<br />

Computerworld from<br />

http://www.computerworld.com/action/article.do?command=viewArticleBasic&<br />

articleId=9019472.<br />

Henning, R. R. (2003). Vulnerability assessment in wireless networks. Paper presented<br />

at the Symposium on Applications and the Internet <strong>Work</strong>shops, 2003. .<br />

Hole, K. J., Dyrnes, E., & Thorsheim, P. (2005). Securing Wi-Fi Networks. Computer,<br />

July, 28-34.<br />

Housley, R., & Arbaugh, W. A. (2003). Security problems in 802.11-based networks.<br />

Communication ACM, 46(5), 31-34.<br />

Hurley, C., Thornton, F., & Puchol, M. (2004). Wardriving: drive, detect, defend a<br />

guide to wireless security. Rockland: Syngress Publishing, Inc.<br />

IEEE. (2006). IEEE OUI and Company_id Assignments. Retrieved July 22, 2007,<br />

from http://standards.ieee.org/regauth/oui/oui.txt<br />

Jacobs, D. (2007). 802.11n creates systems integration opportunities. Retrieved June<br />

30, 2007, from<br />

http://searchnetworkingchannel.techtarget.com/tip/0,289483,sid100_gci1255715<br />

,00.html<br />

48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!