ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Wireless Network Security Surveillance Tools for Information Warfare of the Future
Guide to Wireless Network Security
◽
10.1007/978-0-387-29845-0_27
◽
2006
◽
pp. 601-637
Keyword(s):
Network Security
◽
Wireless Network
◽
Information Warfare
◽
Wireless Network Security
◽
The Future
◽
Security Surveillance
Download Full-text
Related Documents
Cited By
References
The Information Warfare Wireless Network Security Arsenal of the Future
Guide to Wireless Network Security
◽
10.1007/978-0-387-29845-0_26
◽
2006
◽
pp. 557-599
Keyword(s):
Network Security
◽
Wireless Network
◽
Information Warfare
◽
Wireless Network Security
◽
The Future
Download Full-text
The Information Warfare Wireless Network Security Arsenal and Tactics of Private Enterprises
Guide to Wireless Network Security
◽
10.1007/978-0-387-29845-0_25
◽
2006
◽
pp. 519-556
Keyword(s):
Network Security
◽
Wireless Network
◽
Private Enterprises
◽
Information Warfare
◽
Wireless Network Security
Download Full-text
The Information Warfare Wireless Network Security Arsenal and Tactics of Terrorists and Rogues
Guide to Wireless Network Security
◽
10.1007/978-0-387-29845-0_24
◽
2006
◽
pp. 459-517
Keyword(s):
Network Security
◽
Wireless Network
◽
Information Warfare
◽
Wireless Network Security
Download Full-text
Civilian Casualties: The Victims and Refugees of Information Warfare Wireless Network Security
Guide to Wireless Network Security
◽
10.1007/978-0-387-29845-0_28
◽
2006
◽
pp. 639-680
Keyword(s):
Network Security
◽
Wireless Network
◽
Information Warfare
◽
Wireless Network Security
Download Full-text
The Information Warfare Wireless Network Security Arsenal and Tactics of the Military
Guide to Wireless Network Security
◽
10.1007/978-0-387-29845-0_23
◽
2006
◽
pp. 409-457
Keyword(s):
Network Security
◽
Wireless Network
◽
Information Warfare
◽
Wireless Network Security
◽
The Military
Download Full-text
Existing wireless network security mechanisms and their limitations for ad hoc networks
IET Irish Signals and Systems Conference (ISSC 2006)
◽
10.1049/cp:20060437
◽
2006
◽
Cited By ~ 1
Author(s):
G.A. Safdar
◽
C. McGrath
◽
M. McLoone
Keyword(s):
Network Security
◽
Ad Hoc Networks
◽
Wireless Network
◽
Ad Hoc
◽
Wireless Network Security
◽
Hoc Networks
Download Full-text
Evaluating Augmented Reality for Wireless Network Security Education
10.1109/fie49875.2021.9637216
◽
2021
◽
Author(s):
Martin Striegel
◽
Jonas Erasmus
◽
Parag Jain
Keyword(s):
Network Security
◽
Augmented Reality
◽
Wireless Network
◽
Wireless Network Security
◽
Security Education
Download Full-text
Wireless Network Security: An Overview
Building Next-Generation Converged Networks
◽
10.1201/b14574-13
◽
2013
◽
pp. 219-240
Keyword(s):
Network Security
◽
Wireless Network
◽
Wireless Network Security
Download Full-text
Wireless Network Security
Communication System Security
◽
10.1201/b12078-16
◽
2012
◽
pp. 421-458
Keyword(s):
Network Security
◽
Wireless Network
◽
Wireless Network Security
Download Full-text
Wireless Network Security
Cybersecurity Fundamentals
◽
10.1201/9781003035626-9
◽
2020
◽
pp. 201-219
Author(s):
Kutub Thakur
◽
Al-Sakib Khan Pathan
Keyword(s):
Network Security
◽
Wireless Network
◽
Wireless Network Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close