[1]
|
Barth, A., Rubinstein, B.I.P., Sundararajan, M., Mitchell, J.C., Song, D. and Bartlett, P.L. (2010) A Learning-Based Approach to Reactive Security. Proceedings of the 14th International Conference on Financial Cryptography and Data Security (FC’10), 192-206. http://dx.doi.org/10.1007/978-3-642-14577-3_16
|
[2]
|
Sari, A. (2012) Impact of Determinants on Student Performance towards Information Communication Technology in Higher Education. International Journal of Learning and Development, 2, 18-30. http://dx.doi.org/10.5296/ijld.v2i2.1371
|
[3]
|
(2003) Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison Wesley.
|
[4]
|
Obasuyi, G. and Sari, A. (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences, 8, 260-273. http://dx.doi.org/10.4236/ijcns.2015.87026
|
[5]
|
IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications, April 2004.
|
[6]
|
Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.
|
[7]
|
(2005) Bulletproof Wireless Security: Gsm, Umts, 802.11, and Ad Hoc Security (Communications Engineering). Newnes.
|
[8]
|
Lynn, M. and Baird, R. (2002) Advanced 802.11 Attack. Black Hat Briefings.
|
[9]
|
Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3, 79-94. http://dx.doi.org/10.5121/ijasuc.2012.3306
|
[10]
|
Bonde, J. (2011) Wireless Security, University of Minnesota UMM CSci Senior Seminar Conference Morris, MN.
|
[11]
|
Sari, A. and Onursal, O. (2013) Role of Information Security in E-Business Operations. International Journal of Information Technology and Business Management, 3, 90-93.
|
[12]
|
Hardjono, T. and Dodeti, L.R. (2005) Security in Wireless LANS and MANS. Artech House Publishers, London, 243-250.
|
[13]
|
Sari, A. (2014) Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS. International Journal of Communications, Network, and System Sciences, 7, 365-372. http://dx.doi.org/10.4236/ijcns.2014.79038
|
[14]
|
Schneier, B. (1996) Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition, John Wiley and Sons, New York.
|
[15]
|
Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, Society for Science and Education, 2, 1-6.
|
[16]
|
Marshall, T. (2001) Antennas Enhance WLAN Security. Byte Articles. http://www.trevormarshall.com/byte_articles/byte1.htm
|
[17]
|
Sari, A., Rahnama, B. and Caglar, E. (2014) Ultra-Fast Lithium Cell Charging for Mission Critical Applications. Transactions on Machine Learning and Artificial Intelligence, 2, 11-18. http://dx.doi.org/10.14738/tmlai.25.430
|
[18]
|
Josyula, D. (2006) Reactive Architectures. Dissertation, Department of Computer Science, University of Maryland. http://www.cs.umd.edu/~darsana/papers/dissertation/node151.html
|
[19]
|
Chiornita, A., Gheorghe, L. and Rosner, D. (2010) A Practical Analysis of EAP Authentication Methods. 9th Roedunet International Conference (RoEduNet), 31-35.
|
[20]
|
Hausken, K. (2006) Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability. Information Systems Frontiers, 8, 338-349. http://dx.doi.org/10.1007/s10796-006-9011-6
|
[21]
|
Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, 6, 142-154. http://dx.doi.org/10.4236/jis.2015.62015
|
[22]
|
Gordon, L.A. and Loeb, M.P. (2002) The Economics of Information Security Investment. ACM Transactions on Information and System Security, 5, 438-457. http://dx.doi.org/10.1145/581271.581274
|
[23]
|
Sari, A. and Caglar, E. (2015) Performance Simulation of Gossip Relay Protocol in Multi-Hop Wireless Networks. Social and Applied Sciences Journal, 7, 145-148.
|
[24]
|
Sari, A. and Mahmutoglu, H. (2013) Potential Issues and Impacts of ICT Applications through Learning Process in Higher Education. Procedia—Social and Behavioural Sciences, 89, 585-592. http://dx.doi.org/10.1016/j.sbspro.2013.08.899
|
[25]
|
August, T. and Tunca, T.I. (2006) Network Software Security and User Incentives. Management Science, 52, 1703-1720. http://dx.doi.org/10.1287/mnsc.1060.0568
|
[26]
|
Sari, A. and Rahnama, B. (2013) Addressing Security Challenges in WiMAX Environment. In: Proceedings of the 6th International Conference on Security of Information and Networks (SIN’13), ACM Press, New York, 454-456. http://doi.acm.org/10.1145/2523514.2523586 http://dx.doi.org/10.1145/2523514.2523586
|
[27]
|
Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, 5-7 June 2013, 334-337. http://dx.doi.org/10.1109/cicsyn.2013.79
|
[28]
|
Fultz, N. and Grossklags, J. (2009) Blue versus Red: Towards a Model of Distributed Security Attacks. Proceedings of the 13th International Conference on Financial Cryptography and Data Security, Accra Beach, 23-26 February 2009, 167-183. http://dx.doi.org/10.1007/978-3-642-03549-4_10
|
[29]
|
Sari, A. (2015) Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks. New Threats and Countermeasures in Digital Crime and Cyber Terrorism, IGI Global, Hershey, 66-94. http://dx.doi.org/10.4018/978-1-4666-8345-7.ch005
|
[30]
|
Flegel, U. (2012) Reactive Security. Information Technology, 54, 51-52.
|
[31]
|
Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28. http://dx.doi.org/10.4236/ijcns.2015.83003
|
[32]
|
Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42. http://dx.doi.org/10.4236/ijcns.2015.83004
|
[33]
|
Rahnama, B., Sari, A. and Makvandi, R. (2013) Countering PCIe Gen. 3 Data Transfer Rate Imperfection Using Serial Data Interconnect. Proceedings of the International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, 9-11 May 2013, 579-582. http://doi.acm.org/10.1109/TAEECE.2013.6557339
|