[1]
|
Kumar, U. and Gambhir, S. (2014) A Literature Review of Security Threats to Wireless Networks. International Journal of Future Generation Communication and Networking, 7, 25-34. http://dx.doi.org/10.14257/ijfgcn.2014.7.4.03
|
[2]
|
Sari, A. (2012) Impact of Determinants on Student Performance towards Information Communication Technology in Higher Education. International Journal of Learning and Development, 2, 18-30. http://dx.doi.org/10.5296/ijld.v2i2.1371
|
[3]
|
Benton, K. (2010) The Evolution of 802.11 Wireless Security. INF 795, April 18th, 2010. UNLV Informatics, Spring.
|
[4]
|
Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.
|
[5]
|
Lehembre, G. (2006) Wi-Fi Security—WEP, WPA and WPA2. Article Published in Number 1/2006 (14) of Hakin9. www.hsc.fr
|
[6]
|
Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3, 79-94. http://dx.doi.org/10.5121/ijasuc.2012.3306
|
[7]
|
Bulbul, H.I., Batmaz, I. and Ozel, M. (2008) Wireless Network Security: Comparison of WEP (Wired Equivalent Privacy) Mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) Security Protocols. Proceedings of the 1st International Conference on Forensic Applications and Techniques, Information, and Multimedia and Workshop, Adelaide, 21-23 January 2008. http://dx.doi.org/10.4108/e-forensics.2008.2654
|
[8]
|
Sari, A. and Onursal, O. (2013) Role of Information Security in E-Business Operations. International Journal of Information Technology and Business Management, 3, 90-93.
|
[9]
|
Arockiam, L. and Vani, B. (2010) A Survey of Denial of Service Attacks and Its Countermeasures on Wireless Network. International Journal on Computer Science and Engineering, 2, 1563-1571.
|
[10]
|
Sari, A. (2014) Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS. International Journal of Communications, Network, and System Sciences, 7, 365-372. http://dx.doi.org/10.4236/ijcns.2014.79038
|
[11]
|
Gutjahr, A. (2012) Wired Equivalent Privacy (WEP) Functionality, Weak Points, Attacks.
|
[12]
|
Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, 2, 1-6.
|
[13]
|
Tews, E. (2007) Attacks on the Wep Protocol. Cryptology ePrint Archive, Report 2007/471.
|
[14]
|
Sari, A., Rahnama, B. and Caglar, E. (2014) Ultra-Fast Lithium Cell Charging for Mission Critical Applications. Transactions on Machine Learning and Artificial Intelligence, 2, 11-18. http://dx.doi.org/10.14738/tmlai.25.430
|
[15]
|
Frankel, S., Eydt, B., Owens, L. and Scarfone, K. (2007) Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. National Institute of Standards and Technology, NIST 800-97. http://csrc.nist.gov/publications/nistpubs/800-97/SP800-97.pdf
|
[16]
|
Sari, A. (2014) Economic Impact of Higher Education Institutions in a Small Island: A Case of TRNC. Global Journal of Sociology, 4, 41-45.
|
[17]
|
Masadeh, S.R. and Turab, N. (2011) A Formal Evaluation of the Security Schemes for Wireless Networks. Research Journal of Applied Sciences, Engineering and Technology, 3, 910-913.
|
[18]
|
Ihonen, M., Salo, A. and Timonen, T. (2009) 802.11 Security Protocols, Seminar Report. Laboratory of Communications Software, Lappeenranta University of Technology, Lappeenranta.
|
[19]
|
Mishra, A. and Arbaugh, W.A. (2002) An Initial Security Analysis of The IEEE 802.1X Standard. Technical Report CS-TR-4328 and UMIACS-TR-2002-10. Department of Computer Science, University of Maryland Institute for Advanced Computer Studies, College Park.
|
[20]
|
Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, 6, 142-154. http://dx.doi.org/10.4236/jis.2015.62015
|
[21]
|
Chen, J.-C., Jiang, M.-C. and Liu, Y.-W. (2005) Wireless LAN Security and IEEE 802.11i. IEEE Wireless Communications, 12, 27-36. http://dx.doi.org/10.1109/MWC.2005.1404570
|
[22]
|
Obasuyi, G. and Sari, A. (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences, 8, 260-273. http://dx.doi.org/10.4236/ijcns.2015.87026
|
[23]
|
Rigney, C., Willens, S., Rubens, A. and Simpson, W. (2000) Remote Authentication Dial in User Service (RADIUS). RFC 2865.
|
[24]
|
Sari, A. and Caglar, E. (2015) Performance Simulation of Gossip Relay Protocol in Multi-Hop Wireless Networks. Social and Applied Sciences Journal, 7, 145-148.
|
[25]
|
Chiornita, A., Gheorghe, L. and Rosner, D. (2010) A Practical Analysis of EAP Authentication Methods. 2010 9th Roedunet International Conference (RoEduNet), Sibiu, 24-26 June 2010, 31-35.
|
[26]
|
Sari, A. and Mahmutoglu, H. (2013) Potential Issues and Impacts of ICT Applications through Learning Process in Higher Education. Procedia—Social and Behavioral Sciences, 89, 585-592. http://dx.doi.org/10.1016/j.sbspro.2013.08.899
|
[27]
|
Turab, N. and Masadeh, S. (2010) Recommendations Guide for WLAN Security. International Journal of ACM Jordan, 1.
|
[28]
|
Sari, A. and Rahnama, B. (2013) Addressing Security Challenges in WiMAX Environment. Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, 26-28 November 2013, 454-456. http://dx.doi.org/10.1145/2523514.2523586
|
[29]
|
Miller, B. (2008) WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises. Global Knowledge.
|
[30]
|
Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. 2013 5th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, 5-7 June 2013, 334-337.
|
[31]
|
http://www.sabc.co.za/manual/ibm/9agloss.htm
|
[32]
|
Sari, A. (2014) Influence of ICT Applications on Learning Process in Higher Education. Procedia—Social and Behavioral Sciences, 116, 4939-4945. http://dx.doi.org/10.1016/j.sbspro.2014.01.1053
|
[33]
|
Edney, J. and Arbaugh, W.A. (2003) Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, Boston.
|
[34]
|
Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28. http://dx.doi.org/10.4236/ijcns.2015.83003
|
[35]
|
Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42. http://dx.doi.org/10.4236/ijcns.2015.83004
|
[36]
|
Rahnama, B., Sari, A. and Makvandi, R. (2013) Countering PCIe Gen. 3 Data Transfer Rate Imperfection Using Serial Data Interconnect. 2013 International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, 9-11 May 2013, 579-582.
|