I. Introduction
This paper addresses the issue of identifying a network attack in which an intruder is seeking to enter into a local network that restricts access and allows only authorized stations by their MAC address.
Scheduled Maintenance on Monday 1/13/2025
Single article sales and account management will be unavailable from 5:00 AM - 7:00 PM ET (09:00 - 23:00 UTC). We apologize for the inconvenience.
This paper addresses the issue of identifying a network attack in which an intruder is seeking to enter into a local network that restricts access and allows only authorized stations by their MAC address.
Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826)
Published: 2004
[1988] Proceedings. Computer Networking Symposium
Published: 1988
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2025 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Test Whats new message.