Academic literature on the topic 'Deauthentication attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deauthentication attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Deauthentication attack"
Kristiyanto, Yogi, and Ernastuti E. "Analysis of Deauthentication Attack on IEEE 802.11 Connectivity Based on IoT Technology Using External Penetration Test." CommIT (Communication and Information Technology) Journal 14, no. 1 (May 31, 2020): 45. http://dx.doi.org/10.21512/commit.v14i1.6337.
Full textCheema, Rupinder, Divya Bansal, and Sanjeev Sofat. "Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks." International Journal of Computer Applications 23, no. 7 (June 30, 2011): 7–15. http://dx.doi.org/10.5120/2901-3801.
Full textMilliken, Jonny, Valerio Selis, Kian Meng Yap, and Alan Marshall. "Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance." IEEE Wireless Communications Letters 2, no. 5 (October 2013): 571–74. http://dx.doi.org/10.1109/wcl.2013.072513.130428.
Full textBahaweres, R. B., S. Mokoginta, and M. Alaydrus. "Comparison of methods for localizing the source position of deauthentication attacks on WAP 802.11n using Chanalyzer and Wi-Spy 2.4x." Journal of Physics: Conference Series 801 (January 2017): 012056. http://dx.doi.org/10.1088/1742-6596/801/1/012056.
Full textDubrovin, V. I., B. V. Petryk, and G. V. Nelasa. "Detection of DOS-attacks in network traffic by the method of Wavelet-transformation." Modern information security, 2020. http://dx.doi.org/10.31673/2409-7292.2020.023746.
Full textКорольков, Роман Юрійович, and Сергій Вікторович Куцак. "The features of a deauthentication attack implementation in networks 802.11." Ukrainian Information Security Research Journal 21, no. 3 (September 27, 2019). http://dx.doi.org/10.18372/2410-7840.21.13953.
Full textDissertations / Theses on the topic "Deauthentication attack"
Stehlík, Richard. "Útok na WiFi síť s využitím ESP32/8266." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445502.
Full textBook chapters on the topic "Deauthentication attack"
Marais, Stephan, Marijke Coetzee, and Franz Blauw. "Simultaneous Deauthentication of Equals Attack." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 545–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68884-4_45.
Full textConference papers on the topic "Deauthentication attack"
Mar, Jeich, Yow-Cheng Yeh, and I.-Fan Hsiao. "An ANFIS-IDS against deauthentication DOS attacks for a WLAN." In Its Applications (Isita2010). IEEE, 2010. http://dx.doi.org/10.1109/isita.2010.5654405.
Full textHuhta, Otto, Prakash Shrestha, Swapnil Udar, Mika Juuti, Nitesh Saxena, and N. Asokan. "Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2016. http://dx.doi.org/10.14722/ndss.2016.23199.
Full textNguyen, T. D., D. Nguyen, B. N. Tran, H. Vu, and N. Mittal. "A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks." In 17th International Conference on Computer Communications and Networks 2008. IEEE, 2008. http://dx.doi.org/10.1109/icccn.2008.ecp.51.
Full text