أمن الشبكات اللاسلكية المخاطر والحماية

Main Article Content

أحمد نورى دخيل
سعد طلحة

Abstract

mceclip0-78915eaf0851e597475a6ef41faf784b.png

Article Details

How to Cite
أحمد نورى دخيل, & سعد طلحة. (2024). أمن الشبكات اللاسلكية المخاطر والحماية. The International Journal of Engineering & Information Technology (IJEIT), 4(2). https://doi.org/10.36602/ijeit.v4i2.362
Section
Artical

References

E. Tews, R. P. Weinmann and A. Pyshkin, “Breaking

bit WEP in lessthan 60 seconds,” IACR Eprint

Server, http://eprint.iacr.org/ 2007/120.pdf , number

/120, Accessed April 1, 2007.

Anil Kumar Singh, Bharat Mishra and Sandeep Singh

“WLAN Security Flaw: Cracking 64 bit WEP Key,”

IJCSI International Journal of Computer Science

Issues, Vol. 7, Issue 6, pp. 296-299, Nov. 2010.

Hassan Tahir, Syed Asim Ali Shah, Wireless Sensor

Networks - A Security Perspective. Multi topic

Conference, INMIC 2008. IEEE International

Tanveer A. Zia, An overview of wireless sensor

networks and their security issues. Advanced

Networks Research Group, School of Information

Technologies, 2010, University of Sydney

Michael Healy, Thomas Newe, Elfed Lewis, Security

for Wireless Sensor Networks: A Review, IEEE

Sensors Applications Symposium New Orleans, LA,

USA – 2009

Ali Nur Mohammad Noman, A Generic Framework

For Defining Security Environments Of Wireless

Sensor Networks, 5th International Conference on

Electrical and Computer Engineering ICECE 2008,

Dhaka, Bangladesh

Panu Hämäläinen, Mauri Kuorilehto, Timo Alho,

Marko Hännikäinen, Timo D. Hämäläinen: Security in

Wireless Sensor Networks: Considerations and

Experiments. SAMOS 2006

T.Kavitha, D.Sridharan, Security Vulnerabilities In

Wireless Sensor Networks: A Survey, Journal of

Information Assurance and Security, Vol. 5, 2010

"NetSpot: WiFi Site Survey Software for MAC OS X &

Windows"

Kaufman, Charlie; Perlman, Radia; Speciner, Mike.

Network Security: Private Communication in a Public

World, Second Edition. Prentice Hall PTR. p. 169.

ISBN 978-0-13-046019-6

Margaret Rouse. "Encryption". TechTarget.

Retrieved 26 May 2015.

Penetration Tester's Open Source Toolkit by Johnny

Long and others, Syngress Publishing, Inc., 2006,

page 301.

"SMAC 2.0 MAC Address Changer".

klcconsulting.com. Retrieved 2008-03-17.

]14[ مقااا بعنااوا تقنيااات التشااوير اااح الشاابكات اللاساالكية، جمياا طويلاا ، 27 نااوامبر

.

]15[ مقا بعنوا مصاشد محتراح الشبكات ، Isecur1ty ، 11 سبتمبر 2016

Wireless Security Handbook by Aaron E. Earle,

Auerbach Publications, 2006, pages 319- 320. DOI: https://doi.org/10.1080/00497870600571984

International Journal of Multimedia and Ubiquitous

Engineering, Vol. 3, No. 3, July, 2008 , 83 DOI: https://doi.org/10.1049/et:20081828