Ве молиме користете го овој идентификатор да го цитирате или поврзете овој запис: http://hdl.handle.net/20.500.12188/8191
DC FieldValueLanguage
dc.contributor.authorVesna Dimitrovaen_US
dc.contributor.authorStefan Pavloven_US
dc.date.accessioned2020-05-21T06:30:00Z-
dc.date.available2020-05-21T06:30:00Z-
dc.date.issued2020-05-08-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/8191-
dc.description.abstractThe wireless networks security threats are rising with the development of the wireless technology. The implementation of the security mechanisms in the networks is provided in a way that the mechanisms are incorporated through the wireless network security standards. With the time passing by, there are plenty of efforts in the creation of a multi-layer security system for every wireless network, which would represent the factor of surprise for the attacker, along with the risk of attacks and penetration. However, unlike other types of data transmission, the wireless data transmission is transmitted in all directions and can be received from any device that is compatible with the wireless adapter. Due to this, it is very important that security mechanisms are implemented so that unauthorized access would be prevented from accessing your network or data. In order to achieve the best of the security of our data, we need to work for a bigger and deeper implementation of the security measures in every domain of the wireless telecommunication systems. Whether it is about a computer, a mobile or any other sort of device connected to a wireless network, their vulnerability is almost the same, because each and one of them is exposed to a variety of threats and attacks. That is why the goal of this paper is the research about the attack done on a wireless network.en_US
dc.language.isoenen_US
dc.publisherSs Cyril and Methodius University in Skopje, Faculty of Computer Science and Engineering, Republic of North Macedoniaen_US
dc.relation.ispartofseriesCIIT 2020 short papers;4-
dc.titleA Note on a Successful WEP Attacken_US
dc.typeProceeding articleen_US
dc.relation.conference17th International Conference on Informatics and Information Technologies - CIIT 2020en_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:International Conference on Informatics and Information Technologies
Files in This Item:
File Опис SizeFormat 
CIIT2020_paper_4.pdf218.55 kBAdobe PDFThumbnail
View/Open
Прикажи едноставен запис

Page view(s)

171
Last Week
1
Last month
checked on 27.7.2025

Download(s)

135
checked on 27.7.2025

Google ScholarTM

Проверете


Записите во DSpace се заштитени со авторски права, со сите права задржани, освен ако не е поинаку наведено.