Detection and Elimination of Unauthorized Hosts using MA based WIPS

Download Now
Provided by: RS Publication
Topic: Security
Format: PDF
The incredible rise in the deployment of WLANs is observed in commercial, military and various other domains in past few years. But still there are many loopholes found in present era of wireless network security of which adversaries can easily take advantage. However unauthorized hosts that may be either intruders or rouge access points i.e. Access points which are setup without any knowledge or permission of network admin still continue to be a major threat to this security.
Download Now

Find By Topic