Journal articles on the topic 'De-Authentication Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 journal articles for your research on the topic 'De-Authentication Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Salman Al-Nuaimi, Mustafa Abdulkareem, and Abdullahi Abdu Ibrahim. "Analyzing and Detecting the De-Authentication Attack by Creating an Automated Scanner using Scapy." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 2 (2023): 131–37. http://dx.doi.org/10.17762/ijritcc.v11i2.6137.
Full textGebresilassie, Samson Kahsay, Joseph Rafferty, Liming Chen, Zhan Cui, and Mamun Abu-Tair. "Transfer and CNN-Based De-Authentication (Disassociation) DoS Attack Detection in IoT Wi-Fi Networks." Electronics 12, no. 17 (2023): 3731. http://dx.doi.org/10.3390/electronics12173731.
Full textSafkhani, Masoumeh, Nasour Bagheri, and Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems." Future Internet 10, no. 9 (2018): 82. http://dx.doi.org/10.3390/fi10090082.
Full textSingh, Rajinder, and Satish Kumar. "A Light Weight Solution for Detecting De-Authentication Attack." International Journal of Network Security & Its Applications 11, no. 01 (2019): 15–26. http://dx.doi.org/10.5121/ijnsa.2019.11102.
Full textJi, Sai, Shuai Liu, Chen Wang, Rongxin Qi, and Jian Shen. "An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System." Electronics 9, no. 12 (2020): 2167. http://dx.doi.org/10.3390/electronics9122167.
Full textServati, Mohammad Reza, Masoumeh Safkhani, Saqib Ali, et al. "Cryptanalysis of Two Recent Ultra-Lightweight Authentication Protocols." Mathematics 10, no. 23 (2022): 4611. http://dx.doi.org/10.3390/math10234611.
Full textSooyeon Shin, Jongshin Kim, and Taekyoung Kwon. "Cryptanalysis of the Lightweight and Anonymous Authentication and Access Control for Real-time Applications in Wireless Sensor Networks." Research Briefs on Information and Communication Technology Evolution 5 (November 30, 2019): 86–92. http://dx.doi.org/10.56801/rebicte.v5i.87.
Full textArisandi, Diki, Nazrul M. Ahmad, and Subarmaniam Kannan. "Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP)." Emerging Science Journal 9, no. 1 (2025): 284–310. https://doi.org/10.28991/esj-2025-09-01-016.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.
Full textNyangaresi, Vincent Omollo, Silvance O. Abeka, and Anthony J. Rodrigues. "GUTI-Based Multi-Factor Authentication Protocol for De-synchronization Attack Prevention in LTE Handovers." International Journal of Cyber-Security and Digital Forensics 9, no. 1 (2020): 1–11. http://dx.doi.org/10.17781/p002642.
Full textBallesteros, Juan. "SEGURIDAD EN REDES INALÁMBRICAS DE ACCESO LOCAL BAJO PARÁMETROS DE USO DE HERRAMIENTAS LIBRES." Revista Cientifica TECNIA 26, no. 1 (2016): 57. http://dx.doi.org/10.21754/tecnia-26012016.06.
Full textBallesteros, Juan, and Fabián Chaparro. "SEGURIDAD EN REDES INALÁMBRICAS DE ACCESO LOCAL BAJO PARÁMETROS DE USO DE HERRAMIENTAS LIBRES." Revista Cientifica TECNIA 26, no. 1 (2016): 57. http://dx.doi.org/10.21754/tecnia.v26i1.7.
Full textKumar, Anand, Dharmesh Dhabliya, Pankaj Agarwal, et al. "Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques." Computational Intelligence and Neuroscience 2022 (September 29, 2022): 1–13. http://dx.doi.org/10.1155/2022/8803586.
Full textMs., Dilna e. p1 Ms. Maneesha Manoj2 Ms. Jiji c. j3 Ms. Jeena c. j. 4. Ms. Hrudhya k. p5. "FAKE FACE IDENTIFICATION." International Journal of Advances in Engineering & Scientific Research, ISSN: 2349 –3607 (Online) , ISSN: 2349 –4824 (Print) Vol.4,, Issue 1, Jan-2017, (2017): pp 40–48. https://doi.org/10.5281/zenodo.242479.
Full textMs., Dilna e. p1, Maneesha Manoj2 Ms., Jiji c. j3 Ms., Jeena c. j. Ms., and Hrudhya k. p5 Ms. "FAKE FACE IDENTIFICATION." International Journal of Advances in Engineering & Scientific Research 4, no. 1 (2017): 40–48. https://doi.org/10.5281/zenodo.10774726.
Full textAbdallah, Abdallah Elhigazi, Mosab Hamdan, Mohammed S. M. Gismalla, et al. "Detection of Management-Frames-Based Denial-of-Service Attack in Wireless LAN Network Using Artificial Neural Network." Sensors 23, no. 5 (2023): 2663. http://dx.doi.org/10.3390/s23052663.
Full textAdeyeye Oshin, Michael, Matthew Olusegun Ojewale, Oluyomi Olufemi Kabiawu, Romana Challans, and Kauna Mufeti. "Improving Remote Method Invocation via Method Authorization and Elimination of Registry: An Exploration of Java and Haxe." International Journal of Information, Communication Technology and Applications 1, no. 1 (2015): 152–79. http://dx.doi.org/10.17972/ijicta20151116.
Full textAbhisek, Hazra, Maity Shuvajit, Pal Barnali, and Bandyopadhyay Asok. "Adversarial attacks in signature verification: a deep learning approach." Computer Science and Information Technologies 5, no. 3 (2024): 215–26. https://doi.org/10.11591/csit.v5i3.pp215-226.
Full textFerry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.
Full textSingh, Anuj Kumar, Arun Solanki, Anand Nayyar, and Basit Qureshi. "Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards." Applied Sciences 10, no. 22 (2020): 8291. http://dx.doi.org/10.3390/app10228291.
Full textYuk, Hyeong-Jun, and Kang-Bin Yim. "Enhancement of Password-based Mutual Authentication Protocol against De-synchronization Attacks." Journal of Korea Navigation Institute 17, no. 1 (2013): 24–32. http://dx.doi.org/10.12673/jkoni.2013.17.01.024.
Full textGulab Gaikwad, Adwait, and Balaji Patil. "Securing the Airwaves: A Survey on De-authentication Attacks and Mitigation Strategies." International Journal of Computing and Digital Systems 15, no. 1 (2024): 1307–16. http://dx.doi.org/10.12785/ijcds/160196.
Full textAghili, Seyed, Hamid Mala, and Pedro Peris-Lopez. "Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol." Sensors 18, no. 11 (2018): 3663. http://dx.doi.org/10.3390/s18113663.
Full textDimitris Koutras, Panos Dimitrellos, Panayiotis Kotzanikolaou, and Christos Douligeris. "Automated Wi-Fi intrusion detection tool on 802.11 networks." ITU Journal on Future and Evolving Technologies 5, no. 1 (2024): 88–103. http://dx.doi.org/10.52953/lhxo3338.
Full textAghili, Seyed Farhad, Maede Ashouri-Talouki, and Hamid Mala. "DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT." Journal of Supercomputing 74, no. 1 (2017): 509–25. http://dx.doi.org/10.1007/s11227-017-2139-y.
Full textKumar S, Vignesh. "A Survey of 802.1X: Securing Network Access in the Modern Age." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35325.
Full textFarooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (2019): 2536. http://dx.doi.org/10.3390/en12132536.
Full textHazra, Abhisek, Shuvajit Maity, Barnali Pal, and Asok Bandyopadhyay. "Adversarial attacks in signature verification: a deep learning approach." Computer Science and Information Technologies 5, no. 3 (2024): 215–26. http://dx.doi.org/10.11591/csit.v5i3.p215-226.
Full textTewari, Aakanksha, and Brij B. Gupta. "Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags." International Journal on Semantic Web and Information Systems 16, no. 3 (2020): 20–34. http://dx.doi.org/10.4018/ijswis.2020070102.
Full textNath, Seema, Subhranil Som, and Mukesh Chandra Negi. "Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 1 (2021): 139–47. http://dx.doi.org/10.3233/kes-210059.
Full textAbduljabbar, Zaid Ameen, Vincent Omollo Nyangaresi, Hend Muslim Jasim, et al. "Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture." Sustainability 15, no. 13 (2023): 10264. http://dx.doi.org/10.3390/su151310264.
Full textJaved, Sana, Muhammad Asghar Khan, Ako Muhammad Abdullah, et al. "An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones." Drones 6, no. 10 (2022): 264. http://dx.doi.org/10.3390/drones6100264.
Full textGulyás, Gábor György. "Gépi tanulási módszerek alkalmazása deanonimizálásra." Információs Társadalom 17, no. 1 (2017): 72. http://dx.doi.org/10.22503/inftars.xvii.2017.1.5.
Full textKovalenko, O. Ye. "Security models of the Internet of Things." Mathematical machines and systems 4 (2023): 43–50. http://dx.doi.org/10.34121/1028-9763-2023-4-43-50.
Full textZubarev, Sergey M., Alexander V. Travin, and Aleksey I. Frolov. "TORT LIABILITY IN MAKING AND IMPLEMENTING PUBLIC MANAGEMENT DECISIONS USING DIGITAL INFORMATION SYSTEMS." Vestnik Tomskogo gosudarstvennogo universiteta. Pravo, no. 38 (2020): 121–35. http://dx.doi.org/10.17223/22253513/38/12.
Full textBiran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (2017): 553–61. http://dx.doi.org/10.25046/aj020371.
Full text"Detection and Prevention of De-authentication Attack in Real-time Scenario." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (2019): 3324–30. http://dx.doi.org/10.35940/ijitee.j1217.0881019.
Full textRajinder, Singh, and Kumar Satish. "A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK." January 31, 2019. https://doi.org/10.5121/ijnsa.2019.11102.
Full textNyangaresi, Vincent Omollo, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, et al. "Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-67064-z.
Full textNeelakantan, N. Pratik, and C. Nagesh. "Role of Feature Selection in Intrusion Detection Systems for 802.11 Networks." International Journal of Smart Sensor and Adhoc Network., October 2011, 98–101. http://dx.doi.org/10.47893/ijssan.2011.1030.
Full text"Mitigating the Threat due to Data Deduplication Attacks in Cloud Migration using User Layer Authentication with Light Weight Cryptography." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (2020): 2539–45. http://dx.doi.org/10.35940/ijitee.c8463.019320.
Full textGopalan, S. Harihara, A. Manikandan, N. P. Dharani, and G. Sujatha. "Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks." International Journal of Networked and Distributed Computing, May 28, 2024. http://dx.doi.org/10.1007/s44227-024-00029-w.
Full textTaqieddin, Eyad S. "On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols." International Journal of Communication Networks and Information Security (IJCNIS) 9, no. 2 (2022). http://dx.doi.org/10.17762/ijcnis.v9i2.2376.
Full textSuresh Kumar, V., Osamah Ibrahim Khalaf, Radha Raman Chandan, et al. "Implementation of a novel secured authentication protocol for cyber security applications." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-76306-z.
Full textKydyrbekova, A., and D. Oralbekova. "SPEAKER IDENTIFICATION USING DISTRIBUTION-PRESERVING X-VECTOR GENERATION." Physico-mathematical series, no. 4 (December 4, 2024). https://doi.org/10.32014/2024.2518-1726.314.
Full textCheng, Z., and L. Chen. "Certicateless Public Key Signature Schemes from Standard Algorithms." September 7, 2020. https://doi.org/10.5281/zenodo.4017195.
Full textCsatár, János, Péter Görgey, and Tamás Holczer. "Villamos rendszerek kiberbiztonsága az Ukrajnával kapcsolatos történések tükrében." Scientia et Securitas, March 28, 2024, 1–12. http://dx.doi.org/10.1556/112.2023.00158.
Full text