Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 405-408.
• Information Security • Previous Articles Next Articles
WANG Li1,2,4, XIA Ming-shan1,2, WEI Zhan-chen3,4, QI Fa-zhi1,2,3, CHEN Gang3
CLC Number:
[1]李振兴.无线网络安全面临的技术挑战及未来趋势[J].软件学报,2016,27(6):1328-1348. [2]张博,高松.无线网络安全技术分析[J].信息安全与技术,2013(2):32-34. [3]宋永进.4G无线通信系统的网络安全分析[J].网络安全技术与应用,2017(9):101-120. [4]张焕国,韩文报,来学嘉,等.网络空间安全综述[J].中国科学:信息科学,2016,46(2):125-164. [5]乔恩·爱德尼,威廉·阿尔保.无线局域网安全实务-WPA 与 802.11i[M].北京:人民邮电出版社,2006:37-45. [6]冯栋柱,杨登.基于VLAN技术在高校校园网建设中的应用[J].网络与通信,2010(26):131-134. [7]谭润芳.无线网络安全性探讨[J].信息科技,2008,37(6):24-26. [8]沈芳阳.基于IEEE802.11系列标准的无线局域网安全性研究[D].广州:广东工业大学,2004. [9]吴贤平.基于802.1x的校园网用户身份认证设计与实现[J].制造业自动化,2012,34(5):47-49. [10]李丹,闫晓弟,耶健,等.基于开放源码软件Freeradius的无线网络认证系统实现[J].中国现代教育装备,2012(17):65-67. [11]王志军,张帆.虚拟网络技术在计算机网络信息安全中的应用研究 [J].科技创新与应用,2017,4403:93. [12]文峰.计算机网络病毒与网络安全维护探究 [J].计算机光盘软件与应用,2015. [13]胡俊.计算机网络安全技术在网络安全维护中的应用研究[J].科技风,2014(15):54. [14]李文琴,汪大清.VLAN技术在组建校园网中的应用[J].计算机与现代化,2007(5):76-78. [15]商阳.VLAN技术及其在校园网中的应用[J].科技信息,2007(33):391. |
[1] | GUAN Zheng, LYU Wei, JIA Yao, YANG Zhi-jun. Research on Two-level Scheduled In-band Full-duplex Media Access Control Mechanism [J]. Computer Science, 2021, 48(11A): 464-470. |
[2] | WANG Dong, YUAN Wei, WU Di. Monitoring System for Library Environment Based on WiFi Internet of Things [J]. Computer Science, 2018, 45(11A): 532-534. |
[3] | GAO Wan-ling, HONG Mei, YANG Qiu-hui and ZHAO He. Efficiency Analysis of Different Statistical Algorithms on Statistical Model Checking [J]. Computer Science, 2017, 44(Z6): 499-503. |
[4] | SHI Zhi-kai and ZHU Guo-sheng. WF-C4.5:Handheld Terminal Traffic Identification Method Based on C4.5 Decision Tree in WiFi Environment [J]. Computer Science, 2017, 44(Z6): 270-273. |
[5] | WANG Yue. Impact of Path Loss Exponent on Interference and Carrier Sensing Performance Metrics of 802.11 WLANs [J]. Computer Science, 2017, 44(7): 84-88. |
[6] | LIU Yi, YE Yuan-hang and LING Jie. Transmission Interference Prediction Approach in WLAN Channel [J]. Computer Science, 2015, 42(10): 106-112. |
[7] | YE Jin,LI Tao-shen,WANG Zheng-fei and ZHANG Xiang-li. Defense Mechanism against Misbehavior of MAC Layer in WLAN [J]. Computer Science, 2013, 40(12): 90-93. |
[8] | XIE Dai-jun,HU Han-ying and KONG Fan-zeng. Indoor Positioning Algorithm for WLAN Based on Distribution Overlap and Feature Weighting [J]. Computer Science, 2013, 40(11): 38-42. |
[9] | . Optimal Window Based Backoff Algorithm for IEEE 802. 1 1 WLANs [J]. Computer Science, 2012, 39(1): 82-84. |
[10] | XU Lin,ZHU Yi-hua,HU Hua. Delay Aware Power Management Scheme for WLANs [J]. Computer Science, 2011, 38(10): 113-116. |
[11] | ZHANG Li-zhuo,JIA Wei-jia,ZHOU Shi-fei. Research on Improved Handoff Scheme between 3G and WLAN Networks [J]. Computer Science, 2010, 37(3): 49-51. |
[12] | . [J]. Computer Science, 2009, 36(3): 48-50. |
[13] | . [J]. Computer Science, 2009, 36(3): 112-115. |
[14] | HUANG Jia-wei, WANG Jian-xin (School of Information Science and Engineering,Central South University,Changsha 410083,China). [J]. Computer Science, 2009, 36(2): 42-46. |
[15] | LI Yan, ZHU Guang-Xi (Wuhan Optical-Electrouc National Laboratory, Huazhong University of Science and Technology, Wuhan 430074). [J]. Computer Science, 2008, 35(4): 28-32. |
|