Home invasion: securing home access to business networks

被引:0
|
作者
ISACA [1 ]
机构
来源
Netw. Secur. | 2007年 / 12卷 / 8-10期
关键词
Electronic commerce;
D O I
10.1016/S1353-4858(07)70102-2
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Lesson 164: Tools for securing home networks
    Steinke, Steve
    Network Magazine, 2002, 17 (03):
  • [2] Home invasion: Commercial networks move in
    Wright, M
    EDN, 1999, 44 (14) : 59 - +
  • [3] Securing mesh networks - A novel solution for home scenario
    Prasad, Anand R.
    2007 2nd International Conference on Communication Systems Software & Middleware, Vols 1 and 2, 2007, : 282 - 286
  • [4] Securing a Connected Home
    Camphouse, Andrew
    Ngalamou, Lucien
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 250 - 256
  • [5] Securing Smart Home Networks with Software-Defined Perimeter
    Sallam, Ahmed
    Refaey, Ahmed
    Shami, Abdallah
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1989 - 1993
  • [6] Securing Home IoT Environments with Attribute-Based Access Control
    Bezawada, Bruhadeshwar
    Haefner, Kyle
    Ray, Indrakshi
    PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, : 43 - 53
  • [7] Home Invasion
    Barton-Fumo, Margaret
    FILM COMMENT, 2016, 52 (06) : 93 - 93
  • [8] Home invasion
    Manes, S
    FORBES, 2001, 167 (06): : 172 - 172
  • [9] Home invasion
    Judis, JB
    NEW REPUBLIC, 2005, 232 (18) : 18 - +
  • [10] Home invasion
    Dubin, R
    CANADIAN MEDICAL ASSOCIATION JOURNAL, 2005, 173 (02) : 133 - 133