23.04.2023 II International scientific and practical conference "Sustainable forestry"
1. C. Stevenson et al., “IEEE 802.22: The first cognitive radio wireless regional area network standard,” IEEE Commun. Mag., vol. 47, no. 1, pp. 130–138, Jan. 2009. 2. E. Ferro and F. Potorti, “Bluetooth and Wi-Fi wireless protocols: A survey and a comparison,” IEEE Wireless Commun., vol. 12, no. 1, pp. 12–26, Feb. 2005. 3. M. Polla, F. Martinelli, and D. Sgandurra, “A Survey on security for mobile devices,” IEEE Commun. Surv. Tut., vol. 15, no. 1, pp. 446–471, Mar. 2013. 4. D. Pareit, I. Moerman, and P. Demeester, “The history of WiMAX: A complete survey of the evolution in certification and standardization for IEEE 802.16 and WiMAX,” IEEE Commun. Surv. Tut., vol. 14, no. 4, pp. 1183–1211, Oct. 2012. 5. J. Cao, H. Ma, H. Li, and Y. Zhang, “A survey on security aspects for LTE and LTE-A networks,” IEEE Commun. Surv. Tut., vol. 15, no. 2, Apr. 2013 6. A. Lashkari, M. Danesh, and B. Samadi, “A survey on wireless security protocols (WEP, WPA and WPA2/802.11i),” in Proc. 2nd IEEE Int. Conf. Comput. Sci. Inf. Technol., Beijing, China, Aug. 2009, pp. 48–52. 7. J. Lee and C. Fan, “Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP/TKIP,” in Proc. Int. Symp. Intell. Signal Process. Commun. Syst., Xiamen, China, Nov. 2007, pp. 56–59. 8. A. Stubbleleld, J. Ioannidis, and A. D. Rubin, “A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP),” ACM Trans. Inf. Syst. Security, vol. 7, no. 2, pp. 319–332, May 2004. 9. E. Tews, R.-P. Weinmann, and A. Pyshkin, “Breaking 104 bit WEP in less than 60 seconds,” in Information Security Applications. Lecture Notes in Computer Science, Berlin, Germany: Springer-Verlag, 2007, vol. 4867, pp. 188–202. 10. J. Lin, Y. Kao, and C. Yang, “Secure enhanced wireless transfer protocol,” in Proc. 1st Int. Conf. Availab. Reliab. Security, Vienna, Austria, Apr. 2006, pp. 536–543. 11. C. Nancy, H. Russ, W. David, and W. Jesse, “Security flaws in 802.11 data link protocols,” Commun. ACM, vol. 46, no. 5, pp. 35–39, May 2003. 12. E. Tews and M. Beck, “Practical attacks against WEP and WPA,” in Proc. 2nd ACM Conf. Wireless Netw. Security, Zurich, Switzerland, Mar. 2009, pp. 79–86.