Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,289 papers from all fields of science
Search
Sign In
Create Free Account
Wireless intrusion prevention system
Known as:
WIDS
, WIPS
, Wireless Intrusion Detection System
In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Cracking of wireless networks
Denial-of-service attack
Evil twin (wireless networks)
MAC address
Expand
Broader (2)
Data security
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Representation Learning with Weighted Inner Product for Universal Approximation of General Similarities
Geewook Kim
,
Akifumi Okuno
,
Kazuki Fukui
,
Hidetoshi Shimodaira
International Joint Conference on Artificial…
2019
Corpus ID: 67856120
We propose weighted inner product similarity (WIPS) for neural network-based graph embedding. In addition to the parameters of…
Expand
Review
2017
Review
2017
Proceedings of the Fourth (2017) ACM Conference on Learning @ Scale
Claudia M Urrea
,
J. Reich
,
Candace Thille
2017
Corpus ID: 86433617
It is our great pleasure to present the Proceedings of the Fourth Annual ACM Conference on Learning at Scale, L@S 2017, held on…
Expand
2016
2016
A study on the Kismet-based wireless intrusion prevention system
Chang-Su Kim
,
Chu Xun
,
Hoe-Kyung Jung
2016
Corpus ID: 54072281
Recently, the use of wireless networks that can be used conveniently increases due to the increasing number of people who are…
Expand
Review
2014
Review
2014
Cisco Wireless Intrusion Prevention System Solution Overview
2014
Corpus ID: 13299753
Ten billion. That’s how many mobile devices will populate our planet by 2017. 1 This rapid proliferation in mobility is…
Expand
2013
2013
Efficient Mobile Device Management Scheme Using Security Events from Wireless Intrusion Prevention System
Hyeokchan Kwon
,
Sin-Hyo Kim
2013
Corpus ID: 59814489
In this paper, we present an efficient mobile device management scheme using security events from wireless intrusion prevention…
Expand
2013
2013
Achieving Lean Objectives through RFID: A Simulation-Based Assessment
Jongsawas Chongwatpol
,
R. Sharda
Decision Sciences
2013
Corpus ID: 21158546
Lean concepts in manufacturing have focused on elimination of wastes within the business processes. This study investigates…
Expand
2009
2009
Wireless Intrusion Detection for defending against TCP SYN flooding attack and man-in-the-middle attack
Huan-rong Tang
,
Rouyu Sun
,
Weiqiang Kong
International Conference on Machine Learning and…
2009
Corpus ID: 21113589
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more…
Expand
2008
2008
WIDS: a sensor-based online mining wireless intrusion detection system
C. Ezeife
,
Maxwell Ejelike
,
A. Aggarwal
International Database Engineering and…
2008
Corpus ID: 11305516
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless…
Expand
2005
2005
Wireless Intrusion Detection Systems
Giac Security Essentials
2005
Corpus ID: 63393496
This paper will briefly introduce the concept of Wireless technologies, outline the key security threats for wireless networking…
Expand
2003
2003
High-resolution CMOS particle detectors: design and test issues
D. Passeri
,
P. Placidi
,
+4 authors
G. Bilei
IEEE Nuclear Science Symposium Conference Record
2003
Corpus ID: 23015508
In this paper, we discuss some issues related to the design, implementation and test of a CMOS active pixel sensor chip (RAPS01…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE