Abstract
![CDATA[Network intrusions are not limited to wired communications networks and systems, the growth of wireless networks and access devices have created more security vulnerabilities and resulted in more incidents and threats to both organizations and consumers. In this paper we highlight the wireless network vulnerabilities and threats, and discuss the types of digital forensics techniques and security mechanisms to detect intrusion of both wireless devices and systems.]]
Original language | English |
---|---|
Title of host publication | Proceedings of the 5th International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET), held in Penang, Malaysia, 18-20 November, 2008 |
Publisher | IEEE |
Number of pages | 4 |
ISBN (Print) | 9781424429615 |
Publication status | Published - 2008 |
Event | High Capacity Optical Networks and Enabling Technologies Conference - Duration: 1 Jan 2008 → … |
Conference
Conference | High Capacity Optical Networks and Enabling Technologies Conference |
---|---|
Period | 1/01/08 → … |
Keywords
- data encryption (computer science)
- wireless communication systems
- security measures
- forensic engineering
- computer forensics
- computer crimes