@inproceedings{74470df391f64f81b565ac88acb5c428,
title = "Security for WISP through Mikrotik equipment",
abstract = "This document describes the different attacks that a WISP (Wireless Internet Service Provider) company is exposed to provide last mile services wireless, according to which it designs and implements a security policy based on the requirements and demands presented by this type of scenarios using Mikrotik equipment.",
keywords = "Cyber-attacks, Radius, Security networks, Wireless networks, WISP",
author = "W. Pauzhi and J. Coronel",
year = "2016",
month = feb,
day = "4",
doi = "10.1109/Chilecon.2015.7400381",
language = "English",
series = "CHILECON 2015 - 2015 IEEE Chilean Conference on Electrical, Electronics Engineering, Information and Communication Technologies, Proceedings of IEEE Chilecon 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "229--233",
editor = "Fernandez, {Mario F.} and Lefranc, {Gaston H.} and Ricardo Perez",
booktitle = "CHILECON 2015 - 2015 IEEE Chilean Conference on Electrical, Electronics Engineering, Information and Communication Technologies, Proceedings of IEEE Chilecon 2015",
address = "United States",
note = "IEEE Chilean Conference on Electrical, Electronics Engineering, Information and Communication Technologies, CHILECON 2015 ; Conference date: 28-10-2015 Through 30-10-2015",
}