Journal articles on the topic 'Wi-Fi attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Wi-Fi attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dagelić, Ante, Toni Perković, Bojan Vujatović, and Mario Čagalj. "SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists." Wireless Communications and Mobile Computing 2018 (July 22, 2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.
Full textReyes-Moncayo, Hector Ivan, Luis Daniel Malaver- Mendoza, and Andrea Lorena Ochoa-Murillo. "Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames." Scientia et Technica 25, no. 3 (September 30, 2020): 351–57. http://dx.doi.org/10.22517/23447214.23781.
Full textKohlios, Christopher, and Thaier Hayajneh. "A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3." Electronics 7, no. 11 (October 30, 2018): 284. http://dx.doi.org/10.3390/electronics7110284.
Full text., Rabia, Naveed Ali, Shahzaib Ali, Ahthasham Sajid, and Afia Zafar. "A SECURITY REVIEW OVER WI-FI AND LI-FI." Information Management and Computer Science 3, no. 1 (April 6, 2020): 01–09. http://dx.doi.org/10.26480/imcs.01.2020.01.09.
Full textChen, Yongle, Xiaojian Wang, Yuli Yang, and Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract." Sensors 20, no. 4 (February 15, 2020): 1062. http://dx.doi.org/10.3390/s20041062.
Full textXin, Liangxiao, David Starobinski, and Guevara Noubir. "Cascading Attacks on Wi-Fi Networks: Theory and Experiments." IEEE Transactions on Control of Network Systems 7, no. 4 (December 2020): 1757–68. http://dx.doi.org/10.1109/tcns.2020.2999452.
Full textA. Reyes, Abel, Francisco D. Vaca, Gabriel A. Castro Aguayo, Quamar Niyaz, and Vijay Devabhaktuni. "A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System." Electronics 9, no. 10 (October 15, 2020): 1689. http://dx.doi.org/10.3390/electronics9101689.
Full textPark, Min-Woo, Young-Hyun Choi, Jung-Ho Eom, and Tai-Myoung Chung. "Dangerous Wi-Fi access point: attacks to benign smartphone applications." Personal and Ubiquitous Computing 18, no. 6 (October 29, 2013): 1373–86. http://dx.doi.org/10.1007/s00779-013-0739-y.
Full textXin, Liangxiao, and David Starobinski. "Countering Cascading Denial of Service Attacks on Wi-Fi Networks." IEEE/ACM Transactions on Networking 29, no. 3 (June 2021): 1335–48. http://dx.doi.org/10.1109/tnet.2021.3062363.
Full textSharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." International Journal of E-Services and Mobile Applications 10, no. 2 (April 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Full textFong, Ken Kin-Kiu, and Stanley Kam Sing Wong. "Wi-Fi Adoption and Security in Hong Kong." Asian Social Science 12, no. 6 (May 20, 2016): 1. http://dx.doi.org/10.5539/ass.v12n6p1.
Full textIlham Firdaus, Januar Al Amien, and Soni Soni. "String Matching untuk Mendeteksi Serangan Sniffing (ARP Spoofing) pada IDS Snort." Jurnal CoSciTech (Computer Science and Information Technology) 1, no. 2 (October 31, 2020): 44–49. http://dx.doi.org/10.37859/coscitech.v1i2.2180.
Full textSharma, Kavita, and B. B. Gupta. "Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel." Procedia Computer Science 78 (2016): 19–25. http://dx.doi.org/10.1016/j.procs.2016.02.005.
Full textElhamahmy, M., and T. Sobh. "Preventing Information Leakage Caused by War Driving Attacks in Wi-Fi Networks." International Conference on Aerospace Sciences and Aviation Technology 14, AEROSPACE SCIENCES (May 1, 2011): 1–9. http://dx.doi.org/10.21608/asat.2011.23405.
Full textKalniņš, Rūdolfs, Jānis Puriņš, and Gundars Alksnis. "Security Evaluation of Wireless Network Access Points." Applied Computer Systems 21, no. 1 (May 24, 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.
Full textMirzoev, Timur, and Joel Stacey White. "The Role of Client Isolation in Protecting Wi-Fi Users from ARP Spoofing Attacks." i-manager's Journal on Information Technology 1, no. 2 (May 15, 2012): 11–17. http://dx.doi.org/10.26634/jit.1.2.1779.
Full textNivaashini, M., and P. Thangaraj. "Computational intelligence techniques for automatic detection of Wi-Fi attacks in wireless IoT networks." Wireless Networks 27, no. 4 (April 15, 2021): 2761–84. http://dx.doi.org/10.1007/s11276-021-02594-2.
Full textTang, Zhanyong, Yujie Zhao, Lei Yang, Shengde Qi, Dingyi Fang, Xiaojiang Chen, Xiaoqing Gong, and Zheng Wang. "Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes." Mobile Information Systems 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1248578.
Full textKovtsur, M., A. Kistruga, G. Voroshnin, and A. Fedorova. "Research of authentication failure and ARP inject attacks and methods of their detection in IEEE 802.11 networks." Telecom IT 9, no. 1 (March 31, 2021): 87–98. http://dx.doi.org/10.31854/2307-1303-2021-9-1-87-98.
Full textAbdul Malik, Mohd Mirza, Mohd Nizam Osman, and Mushahadah Maghribi. "Monitoring and Evaluating Open Wireless LAN using Hybrid IDS." Journal of Computing Research and Innovation 4, no. 2 (November 14, 2019): 60–67. http://dx.doi.org/10.24191/jcrinn.v4i2.118.
Full textIVANCIU, M., and M. ALEXANDRU. "Antidrone Wireless Personal Shield." Bulletin of the Transilvania University of Brasov. Series I - Engineering Sciences 13(62), no. 2 (January 26, 2021): 9–14. http://dx.doi.org/10.31926/but.ens.2020.13.62.1.8.
Full textVitomsky, E. V., and D. N. Somov. "Methods for protecting local wireless network aimed at providing temporary silency of signals and information interaction structure." Issues of radio electronics, no. 3 (April 26, 2020): 35–40. http://dx.doi.org/10.21778/2218-5453-2020-3-35-40.
Full textMugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." International Journal of Information Systems for Crisis Response and Management 10, no. 2 (April 2018): 49–78. http://dx.doi.org/10.4018/ijiscram.2018040103.
Full textThompson, Aderonke F., Oghenerukevwe E. Oyinloye, Matthew T. David, and Boniface K. Alese. "A Secured System for Internet Enabled Host Devices." Network and Communication Technologies 5, no. 1 (February 6, 2020): 26. http://dx.doi.org/10.5539/nct.v5n1p26.
Full textLu, Qian, Haipeng Qu, Yuzhan Ouyang, and Jiahui Zhang. "SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames." Security and Communication Networks 2019 (June 2, 2019): 1–10. http://dx.doi.org/10.1155/2019/2718741.
Full textGaber, Tarek, Yassine El Jazouli, Esraa Eldesouky, and Ahmed Ali. "Autonomous Haulage Systems in the Mining Industry: Cybersecurity, Communication and Safety Issues and Challenges." Electronics 10, no. 11 (June 7, 2021): 1357. http://dx.doi.org/10.3390/electronics10111357.
Full textDevi, P. Prasanya, R. S. Kannan, and M. Ravindran. "A Novel Analysis of Wireless Network Monitoring using Wireshark." Restaurant Business 118, no. 7 (July 28, 2019): 27–33. http://dx.doi.org/10.26643/rb.v118i7.7243.
Full textChuchaev, Alexandr, Yulia Gracheva, and Sergey Malikov. "Attacks on the Information System of Unmanned Vehicles in the Etiology of Road Accidents." Russian Journal of Criminology 15, no. 1 (March 9, 2021): 55–67. http://dx.doi.org/10.17150/2500-4255.2021.15(1).55-67.
Full textPecorella, Tommaso, Laura Pierucci, and Francesca Nizzi. "“Network Sentiment” Framework to Improve Security and Privacy for Smart Home." Future Internet 10, no. 12 (December 19, 2018): 125. http://dx.doi.org/10.3390/fi10120125.
Full textPerković, T., A. Dagelić, M. Bugarić, and M. Čagalj. "On WPA2-Enterprise Privacy in High Education and Science." Security and Communication Networks 2020 (September 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/3731529.
Full textGu, Xiaolin, Wenjia Wu, Xiaodan Gu, Zhen Ling, Ming Yang, and Aibo Song. "Probe Request Based Device Identification Attack and Defense." Sensors 20, no. 16 (August 17, 2020): 4620. http://dx.doi.org/10.3390/s20164620.
Full textGiles, Jim. "City Wi-Fi networks vulnerable to virus attack." New Scientist 201, no. 2693 (January 2009): 19. http://dx.doi.org/10.1016/s0262-4079(09)60277-3.
Full textLee, Il-Gu, Kyungmin Go, and Jung Hoon Lee. "Battery Draining Attack and Defense against Power Saving Wireless LAN Devices." Sensors 20, no. 7 (April 5, 2020): 2043. http://dx.doi.org/10.3390/s20072043.
Full textDondyk, Erich, Louis Rivera, and Cliff C. Zou. "Wi-Fi access denial of service attack to smartphones." International Journal of Security and Networks 8, no. 3 (2013): 117. http://dx.doi.org/10.1504/ijsn.2013.057698.
Full textOmollo, Vincent N., and Ruth K. Chweya. "Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol." Universal Journal of Communications and Network 3, no. 2 (May 2015): 35–40. http://dx.doi.org/10.13189/ujcn.2015.030201.
Full textBartoli, Alberto. "Understanding Server Authentication in WPA3 Enterprise." Applied Sciences 10, no. 21 (November 6, 2020): 7879. http://dx.doi.org/10.3390/app10217879.
Full textBae, Hee-Ra, Min-Young Kim, Su-Kyung Song, Seul-Gi Lee, and Young-Hyun Chang. "Security Attack Analysis for Wireless Router and Free Wi-Fi Hacking Solutions." Journal of the convergence on culture technology 2, no. 4 (December 30, 2016): 65–70. http://dx.doi.org/10.17703/jcct.2016.2.4.65.
Full textFaisol, Ahmad, and Imam Izzat Muttaqin. "IMPLEMENTASI SENSOR MONITORING PADA JARINGAN WI-FI (HOTSPOT) BERBASIS SNORT." Jurnal Teknologi Informasi dan Terapan 5, no. 2 (April 3, 2019): 141–46. http://dx.doi.org/10.25047/jtit.v5i2.92.
Full textAgarwal, Mayank, Santosh Biswas, and Sukumar Nandi. "Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks." IEEE Communications Letters 19, no. 4 (April 2015): 581–84. http://dx.doi.org/10.1109/lcomm.2015.2400443.
Full textKo, DongHyun, Seok-Hwan Choi, Sungyong Ahn, and Yoon-Ho Choi. "Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack." Sensors 20, no. 23 (November 26, 2020): 6756. http://dx.doi.org/10.3390/s20236756.
Full textNakhila, Omar, Muhammad Faisal Amjad, Erich Dondyk, and Cliff Zou. "Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients." Computers & Security 74 (May 2018): 41–54. http://dx.doi.org/10.1016/j.cose.2017.12.009.
Full textDu, Yi-Hong, and Shi-Hua Liu. "Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks." Security and Communication Networks 2018 (June 7, 2018): 1–7. http://dx.doi.org/10.1155/2018/4691203.
Full textRizzi, Antonello, Giuseppe Granato, and Andrea Baiocchi. "Frame-by-frame Wi-Fi attack detection algorithm with scalable and modular machine-learning design." Applied Soft Computing 91 (June 2020): 106188. http://dx.doi.org/10.1016/j.asoc.2020.106188.
Full textS, Smys, Haoxiang Wang, and Abul Basar. "5G Network Simulation in Smart Cities using Neural Network Algorithm." March 2021 3, no. 1 (March 29, 2021): 43–52. http://dx.doi.org/10.36548/jaicn.2021.1.004.
Full textPark, Geun-Duk, Jeong-Soo Park, and Jae-Cheol Ha. "A Secure WPA-PSK Protocol Resistant to Dictionary Attack on Smartphone Communication Using Wi-Fi Channel." Journal of the Korea Academia-Industrial cooperation Society 13, no. 4 (April 30, 2012): 1839–48. http://dx.doi.org/10.5762/kais.2012.13.4.1839.
Full textAgarwal, Mayank, Santosh Biswas, and Sukumar Nandi. "An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks." International Journal of Wireless Information Networks 25, no. 2 (March 29, 2018): 130–45. http://dx.doi.org/10.1007/s10776-018-0396-1.
Full textYun, Junhyeok, and Mihui Kim. "SybilEye: Observer-Assisted Privacy-Preserving Sybil Attack Detection on Mobile Crowdsensing." Information 11, no. 4 (April 9, 2020): 198. http://dx.doi.org/10.3390/info11040198.
Full textSingh, Alka, and Chitra Singh. "Quad-band FSS for Electromagnetic Shielding." International Journal of Computer Communication and Informatics 3, no. 1 (May 30, 2021): 1–14. http://dx.doi.org/10.34256/ijcci2111.
Full textJohnson, Tyler, Daniel Roggow, Phillip H. Jones, and Joseph Zambreno. "An FPGA Architecture for the Recovery of WPA/WPA2 Keys." Journal of Circuits, Systems and Computers 24, no. 07 (June 17, 2015): 1550105. http://dx.doi.org/10.1142/s0218126615501054.
Full textHsneh, Yu Hsiang, Fu Hau Hsu, Shih Jen Chen, Yao Hsin Chen, Yan Ling Hwang, Chuan Sheng Wang, and Yu Liang Hsu. "ET Detector: A Client-Based Solution to Detect an Evil Twin Access Point." Applied Mechanics and Materials 764-765 (May 2015): 900–904. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.900.
Full text