共 50 条
[21]
Research on authentication security of wireless local area network based on L2TP protocol
[J].
2009 IITA INTERNATIONAL CONFERENCE ON SERVICES SCIENCE, MANAGEMENT AND ENGINEERING, PROCEEDINGS,
2009,
:491-494
[23]
Optimal Network Design for Wireless Local Area Network
[J].
Annals of Operations Research,
2001, 106
:331-345
[24]
Analysis of IEEE 802.11b wireless security for university wireless LAN design
[J].
2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2,
2005,
:1137-1142
[25]
Impact of Transmission Power on the Performance of Secure Wireless Local Area Network
[J].
2014 STUDENTS CONFERENCE ON ENGINEERING AND SYSTEMS (SCES),
2014,
[26]
Advanced Persistent Threats and Wireless Local Area Network Security: An In-Depth Exploration of Attack Surfaces and Mitigation Techniques
[J].
JOURNAL OF CYBERSECURITY AND PRIVACY,
2025, 5 (02)
[27]
Performance Analysis of Wireless Network Throughput and Security Protocol Integration
[J].
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING,
2016, 9 (01)
:71-78
[28]
Fast Authentication Method for Wireless Local Area Network
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2015, 9 (06)
:53-60
[29]
Performance Analysis of Secure Wireless Local Area Network using Test-bed
[J].
2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014),
2014,
:386-389
[30]
Revisiting the Modeling of User Association Patterns in a University Wireless Network
[J].
2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC),
2018,