dc.contributor.author |
Ijeh, Anthony .C. |
|
dc.contributor.author |
Preston, David .S. |
|
dc.contributor.author |
Imafidon, Chris .O. |
|
dc.contributor.author |
Watmon, Titus .B. |
|
dc.contributor.author |
Uwaechie, Annette .O. |
|
dc.contributor.author |
Nwadube, Aaron |
|
dc.contributor.author |
Kujabi, Ebrina |
|
dc.date.accessioned |
2021-11-26T09:03:16Z |
|
dc.date.available |
2021-11-26T09:03:16Z |
|
dc.date.issued |
2010 |
|
dc.identifier.citation |
Ijeh, A. . . . [et al.] (2010]. Geofencing components and existing models. Proceedings of the International MultiConference of engineers and computer sciences 2010 Vol. II, IMECS 2010. |
en_US |
dc.identifier.isbn |
978-988-18210-4-1 |
|
dc.identifier.issn |
2078-0958 |
|
dc.identifier.issn |
2078-0966 |
|
dc.identifier.uri |
https://doi.org/10.60682/5ctq-tf93 |
|
dc.description |
Article |
en_US |
dc.description.abstract |
Abstract-This paper describes the various Geofencing. Components and Existing Models in terms of their Information Security Control Attribute Profiles. The profiles will dictate the security attributes that should accompany each and every Geofencing Model used for Wi-Fi network security control in an organization, thus minimizing the likelihood of malfunctioning security controls. Although it is up to an organization to investigate the best way of implementing information security for itself, by looking at the related models that have been used in the past this paper will present models commonly used to implement information security controls in the organizations. Our findings will highlight the strengths and weaknesses of the various models and present what our experiment and prototype consider as a robust Geofencing Security Model for securing Wi-Fi Networks
Index Terms – Finger Print, Geofencing, Security Strategy, Models, Radio Wave Propagation Models, Antenna, Wireless, Fidelity, Location Estimation Models, Geolocation |
en_US |
dc.description.sponsorship |
International multiconference of engineers and computer sciences
Busitema University. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IMECS |
en_US |
dc.subject |
Finger Print |
en_US |
dc.subject |
Geofencing Security |
en_US |
dc.subject |
Strategy |
en_US |
dc.subject |
Models |
en_US |
dc.subject |
Radio Wave Propagation Models |
en_US |
dc.subject |
Antenna |
en_US |
dc.subject |
Wireless |
en_US |
dc.subject |
Fidelity |
en_US |
dc.subject |
Location Estimation Models |
en_US |
dc.subject |
Geolocation |
en_US |
dc.title |
Geofencing components and existing models. |
en_US |
dc.type |
Article |
en_US |