The paper examines quantitative assessment of wireless distribution system security, as well as an assessment of risks from attacks and security violations. Furthermore, it describes typical security breach and formal attack models and five methods for assessing security. The proposed normalized method for assessing the degree of security assurance operates with at least three characteristics, which allows comparatively analyze heterogeneous information systems. The improved calculating formulas have been proposed for two security assessment methods, and the elements of functional-cost analysis have been applied to calculate the degree of security. To check the results of the analysis, the coefficient of concordance was calculated, which gi...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
The ubiquity of wireless communications, in the home and office environment, introduces information ...
Main focus of this thesis is on wireless networks security auditing. Author's goal is to create new ...
The paper examines quantitative assessment of wireless distribution system security, as well as an a...
The Wireless Technology has become indispensible and integral part of our lives. Lots of services ar...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
An integrated security metrics framework for estimating the overall security level of mobile ad hoc ...
Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, ...
The aim of the work is to review security risks of potencial attacks upon wireless networks.To draw ...
Abstract — this paper presents an evaluation of the security architecture employed in the different ...
Security metrics present the security level of a system or a network in both qualitative and quantit...
This work describes security mechanisms of wireless network based on 802.11 standard and security en...
Nowadays, use of wireless technology in organizations is a regular act, and we can see this technolo...
Wireless transmission has evolved phenomenally over the past few years. It is now a popular means of...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
The ubiquity of wireless communications, in the home and office environment, introduces information ...
Main focus of this thesis is on wireless networks security auditing. Author's goal is to create new ...
The paper examines quantitative assessment of wireless distribution system security, as well as an a...
The Wireless Technology has become indispensible and integral part of our lives. Lots of services ar...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
An integrated security metrics framework for estimating the overall security level of mobile ad hoc ...
Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, ...
The aim of the work is to review security risks of potencial attacks upon wireless networks.To draw ...
Abstract — this paper presents an evaluation of the security architecture employed in the different ...
Security metrics present the security level of a system or a network in both qualitative and quantit...
This work describes security mechanisms of wireless network based on 802.11 standard and security en...
Nowadays, use of wireless technology in organizations is a regular act, and we can see this technolo...
Wireless transmission has evolved phenomenally over the past few years. It is now a popular means of...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
The ubiquity of wireless communications, in the home and office environment, introduces information ...
Main focus of this thesis is on wireless networks security auditing. Author's goal is to create new ...