Citation to this article as recorded by
Bahaman, N., A.S. Prabuwono, M.Z. Mas'ud and M.F. Abdollah, 2012. Effectiveness of security tools to anomalies on tunneled traffic. Inform. Technol. J., 11: 191-199. CrossRefDirect Link |
Lee, S., Y. Lee and S.G. Yoo, 2012. A specification based intrusion detection mechanism for the LEACH protocol. Inform. Technol. J., 11: 40-48. CrossRefDirect Link |
Rasheed, M.M., O. Ghazali and N.M. Norwawi, 2012. Intelligent signature detection for scanning internet worms. Inform. Technol. J., 11: 760-767. CrossRef |
Citation to this article as recorded by
Effectiveness of Security Tools to Anomalies on Tunneled Traffic Information Technology Journal Vol. 11, Issue 2, 191, 2012 |
A Specification Based Intrusion Detection Mechanism for the LEACH Protocol Information Technology Journal Vol. 11, Issue 1, 40, 2012 |
How to cite this article
Sang-Guun Yoo, Soojin Lee, Yunho Lee, Yeong-Kyu Yang and Juho Kim, 2011. Enhanced Intrusion Detection System for PKMv2 EAP-AKA used in WiBro. Information Technology Journal, 10: 1882-1895.
DOI: 10.3923/itj.2011.1882.1895
URL: https://scialert.net/abstract/?doi=itj.2011.1882.1895
DOI: 10.3923/itj.2011.1882.1895
URL: https://scialert.net/abstract/?doi=itj.2011.1882.1895