A Taxonomy of Computer Attacks with Applications to Wireless Networks

The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed with th...

Full description

Bibliographic Details
Main Author: Lough, Daniel Lowry
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2014
Subjects:
Online Access:http://hdl.handle.net/10919/27242
http://scholar.lib.vt.edu/theses/available/etd-04252001-234145/