[1] 马建峰, 朱建明. 无线局域网安全——方法与技术[M]. 北京: 机械工业出版社, 2007. [2] Stubblefield A, Ioannidis J, Rubin A, et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP[C]//Proc. of Network and Distributed Systems Security Symposium. San Diego, USA: [s. n.], 2002: 46-74. [3] Ahuja S P, Krishna D. Security Problems in 802.11-based Wireless Networks[C]//Proc. of the 3rd International Conference on Communications, Internet, and Information Technology. [S. l.]: IEEE Press, 2004: 153-164. [4] Shu Guoqiang, Lee D. Message Confidentiality Testing of Security Protocols——Passive Monitoring and Active Checking[C]// Proc. of International Federation for Information Processing. [S. l.]: Springer, 2006. [5] Shu Guoqiang, Lee D. Testing Security Protocol Properties of Protocol Implementations: A Machine Learning Based Approach[C]//Proc. of International Conference on Distributed Computing Systems. [S. l.]: Springer, 2007. [6] 胡运松, 单 洪, 马 涛. WLAN安全检测与评估系统的设计与实现[J]. 微计算机信息, 2007, 23(30): 108-110. [7] Zhang Yongguang, Lee W. Intrusion Detection in Wireless Ad- hoc Networks[C]//Proc. of the 6th Annual International Conference on Mobile Computing and Networking. New York, USA: ACM Press, 2000: 275-283. [8] 吴建平, 尹 霞. 基于形式化方法的协议测试理论[J]. 清华大学学报: 自然科学版, 2001, 41(4-5): 203-208, 226. [9] 宋 见. 无线局域网安全分析终端设计与实现[D]. 合肥: 中国科学技术大学, 2009. [10] 赵保华, 钱 兰, 郭雄辉, 等. 被动测试中网络监测问题[J].天津大学学报, 2006, 39(7): 801-805. [11] Wilhelm T. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab[M]. [S. l.]: Syngress, 2010. [12] Bacudio A G, Yuan Xiaohong, Chu B T B, et al. An Overview of Penetration Testing[J]. International Journal of Network Security & Its Applications, 2011, 3(6): 19-38. [13] Shewmaker J. Introduction to Network Penetration Testing[C]// Proc. of the 7th Annual IT Conference on Security Awareness Fair. Sacramento, USA: [s. n.], 2008. [14] Kennedy D, Gorman J O, Kearns D, et al. Metasploit——The Pentration Tester’s Guide[M]. [S. l.]: No Starch Press, 2011. [15] 王鹏卓, 张尧弼. 802.11WLAN的安全缺陷及其对策[J]. 计算机工程, 2004, 30(5): 133-136. [16] Bishop M. About Penetration Testing[J]. IEEE Security & Privacy, 2007, 5(6): 84-87. [17] Lam F, 朴 辉. 渗透测试技术在计算机网络安全中的应 用[J]. 安防科技, 2003, (3): 58-59. 编辑 顾逸斐
|