Academic literature on the topic 'Study of wireless network security analysis methods and tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Study of wireless network security analysis methods and tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Study of wireless network security analysis methods and tools"
Samarov, X. K., B. A. Tursunov, and Z. M. Tahirov. "DEVELOPMENT OF ALGORITHM SOFTWARE MODULE FOR ENHANCEMENT OF MESH NETWORK SECURITY." International Journal of Education, Social Science & Humanities. FARS Publishers 11, no. 3 (2023): 205–8. https://doi.org/10.5281/zenodo.7722267.
Full textMcDaid, Alexander, Eoghan Furey, and Kevin Curran. "Wireless Interference Analysis for Home IoT Security Vulnerability Detection." International Journal of Wireless Networks and Broadband Technologies 10, no. 2 (2021): 55–77. http://dx.doi.org/10.4018/ijwnbt.2021070104.
Full textMykhaylova, O., and T. Nakonechny. "SECURITY ANALYSIS OF MODERN WI-FI NETWORK PROTECTION PROTOCOLS: ASSESSMENT OF WPA3 PROTOCOL RESISTANCE DURING ATTACKS BASED ON DRAGONBLOOD UTILITY." Computer systems and network 6, no. 1 (2024): 133–47. http://dx.doi.org/10.23939/csn2024.01.133.
Full textRatnasari Ratnasari, Fernando Juliansyah, Gera Nugraha, Dede Wirta, and Didik Aribowo. "Quality of Service (QoS) Pada Jaringan Wi-Fi (Wireless Fidelity) FKIP UNTIRTA Menggunakan Software Wireshark." Jurnal Elektronika dan Teknik Informatika Terapan ( JENTIK ) 2, no. 2 (2024): 70–76. http://dx.doi.org/10.59061/jentik.v2i2.672.
Full textKaliberda, Elena A., and Andrey M. Shabalin. "SOFTWARE AND HARDWARE STAND AS A MODERN TOOL FOR TEACHING STUDENTS TO CONFIGURE WIRELESS NETWORKS." Russian Journal of Education and Psychology 13, no. 6 (2022): 45–59. http://dx.doi.org/10.12731/2658-4034-2022-13-6-45-59.
Full textMishbahuddin, Ahmad, Puspanda Hatta, and Cucuk Wawan Budiyanto. "ANALYSIS OF WIRELESS NETWORK SIMULATION BASED ON OPENWRT AND PFSENSE WITH QUALITY OF SERVICE INDICATORS ON LOW-COST NETWORK INFRASTRUCTURE." Jurnal Teknik Informatika (Jutif) 5, no. 6 (2024): 1713–22. https://doi.org/10.52436/1.jutif.2024.5.6.4047.
Full textBolodurina, Irina P., Lyubov S. Grishina, Artur Yu Zhigalov, and Denis I. Parfenov. "Hybrid model of effective data representation in wireless transport networks with dynamic VANET topology." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 1 (2022): 65–76. http://dx.doi.org/10.14529/ctcr220105.
Full textDon, Africa, Aaron, and Torrizo, Lorwin Felimar. "Comparative Study of Intrusion Detection Systems against Mainstream Network Sniffing Tools." International Journal of Engineering & Technology 7, no. 4.16 (2018): 188–91. http://dx.doi.org/10.14419/ijet.v7i4.16.22884.
Full textAlhussan, Amel Ali, Hassan K. Ibrahim Al Al-Mahdawi, and Ammar Kadi. "Spam Detection in Connected Networks Using Particle Swarm and Genetic Algorithm Optimization: Youtube as a Case study." International Journal of Wireless and Ad Hoc Communication 6, no. 1 (2023): 08–18. http://dx.doi.org/10.54216/ijwac.060101.
Full textAnzhelika, Parkhomenko, Tulenkov Artem, and Zalyubovskiy Yaroslav. "METHOD OF REMOTE MONITORING OF PARAMETERS OF ELECTRICAL SWITCHBOARD EQUIPMENT OF HOME AUTOMATION SYSTEM." Problems of Modeling and Design Automatization, no. 2 (2020): 28–37. http://dx.doi.org/10.31474/2074-7888-2020-2-28-37.
Full textBooks on the topic "Study of wireless network security analysis methods and tools"
Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Full textBook chapters on the topic "Study of wireless network security analysis methods and tools"
Kavitha, M., Shiney J. Roscia Jeya, P. Gopikannan, and M. Mahalakshmi. "Machine Learning-Based Network Attack Prediction." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-2893-4.ch009.
Full textCao, Xubin, and Yong Lu. "The Social Network Structure of a Computer Hacker Community." In Security and Privacy Assurance in Advancing Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch012.
Full textHui, Jennifer Yang. "Social Media Analytics for Intelligence and Countering Violent Extremism." In National Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7912-0.ch025.
Full textRao, T. Venkat Narayana, Ananya Seeta, J. V. P. Udaya Deepika, and Kumari G. Seshu. "Harnessing Deep Learning for Enhancing Security for Social Empowerment." In Advances in Computational Intelligence and Robotics. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-0954-5.ch018.
Full textCifci, Mehmet Akif. "Optimizing WSNs for CPS Using Machine Learning Techniques." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5101-1.ch010.
Full textDudnik, Andriy, and Andriy Fesenko. "DEVELOPMENT OF THE CONCEPTUAL FRAMEWORK AND EXPERIMENTAL MODEL OF A ROBOTIC SENSOR NETWORK." In Science, technology and innovation in the context of global transformation. Publishing House “Baltija Publishing”, 2024. https://doi.org/10.30525/978-9934-26-499-3-9.
Full textKrishna Pasupuleti, Murali. "Digital Forensics Uncovering Cyber Evidence." In Digital Forensic Science. National Education Services, 2024. http://dx.doi.org/10.62311/nesx/97422614.
Full textConference papers on the topic "Study of wireless network security analysis methods and tools"
Varbanov, Velizar, Kalin Kopanov, and Tatiana Atanasova. "A MULTIDISCIPLINARY APPROACH TO TELEGRAM DATA ANALYSIS." In 24th SGEM International Multidisciplinary Scientific GeoConference 2024. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/2.1/s07.01.
Full textIstrate, Cristiana, George Suciu, Sebastian Ene, and Ijaz Hussain. "AN INTRODUCTION TO UBIQUITOUS COMPUTING IN THE MILITARY NETWORK." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-026.
Full text