Abstract
This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security.
Users
Please
log in to take part in the discussion (add own reviews or comments).