Journal articles on the topic 'Study of wireless network security analysis methods and tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Study of wireless network security analysis methods and tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Samarov, X. K., B. A. Tursunov, and Z. M. Tahirov. "DEVELOPMENT OF ALGORITHM SOFTWARE MODULE FOR ENHANCEMENT OF MESH NETWORK SECURITY." International Journal of Education, Social Science & Humanities. FARS Publishers 11, no. 3 (2023): 205–8. https://doi.org/10.5281/zenodo.7722267.
Full textMcDaid, Alexander, Eoghan Furey, and Kevin Curran. "Wireless Interference Analysis for Home IoT Security Vulnerability Detection." International Journal of Wireless Networks and Broadband Technologies 10, no. 2 (2021): 55–77. http://dx.doi.org/10.4018/ijwnbt.2021070104.
Full textMykhaylova, O., and T. Nakonechny. "SECURITY ANALYSIS OF MODERN WI-FI NETWORK PROTECTION PROTOCOLS: ASSESSMENT OF WPA3 PROTOCOL RESISTANCE DURING ATTACKS BASED ON DRAGONBLOOD UTILITY." Computer systems and network 6, no. 1 (2024): 133–47. http://dx.doi.org/10.23939/csn2024.01.133.
Full textRatnasari Ratnasari, Fernando Juliansyah, Gera Nugraha, Dede Wirta, and Didik Aribowo. "Quality of Service (QoS) Pada Jaringan Wi-Fi (Wireless Fidelity) FKIP UNTIRTA Menggunakan Software Wireshark." Jurnal Elektronika dan Teknik Informatika Terapan ( JENTIK ) 2, no. 2 (2024): 70–76. http://dx.doi.org/10.59061/jentik.v2i2.672.
Full textKaliberda, Elena A., and Andrey M. Shabalin. "SOFTWARE AND HARDWARE STAND AS A MODERN TOOL FOR TEACHING STUDENTS TO CONFIGURE WIRELESS NETWORKS." Russian Journal of Education and Psychology 13, no. 6 (2022): 45–59. http://dx.doi.org/10.12731/2658-4034-2022-13-6-45-59.
Full textMishbahuddin, Ahmad, Puspanda Hatta, and Cucuk Wawan Budiyanto. "ANALYSIS OF WIRELESS NETWORK SIMULATION BASED ON OPENWRT AND PFSENSE WITH QUALITY OF SERVICE INDICATORS ON LOW-COST NETWORK INFRASTRUCTURE." Jurnal Teknik Informatika (Jutif) 5, no. 6 (2024): 1713–22. https://doi.org/10.52436/1.jutif.2024.5.6.4047.
Full textBolodurina, Irina P., Lyubov S. Grishina, Artur Yu Zhigalov, and Denis I. Parfenov. "Hybrid model of effective data representation in wireless transport networks with dynamic VANET topology." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 1 (2022): 65–76. http://dx.doi.org/10.14529/ctcr220105.
Full textDon, Africa, Aaron, and Torrizo, Lorwin Felimar. "Comparative Study of Intrusion Detection Systems against Mainstream Network Sniffing Tools." International Journal of Engineering & Technology 7, no. 4.16 (2018): 188–91. http://dx.doi.org/10.14419/ijet.v7i4.16.22884.
Full textAlhussan, Amel Ali, Hassan K. Ibrahim Al Al-Mahdawi, and Ammar Kadi. "Spam Detection in Connected Networks Using Particle Swarm and Genetic Algorithm Optimization: Youtube as a Case study." International Journal of Wireless and Ad Hoc Communication 6, no. 1 (2023): 08–18. http://dx.doi.org/10.54216/ijwac.060101.
Full textAnzhelika, Parkhomenko, Tulenkov Artem, and Zalyubovskiy Yaroslav. "METHOD OF REMOTE MONITORING OF PARAMETERS OF ELECTRICAL SWITCHBOARD EQUIPMENT OF HOME AUTOMATION SYSTEM." Problems of Modeling and Design Automatization, no. 2 (2020): 28–37. http://dx.doi.org/10.31474/2074-7888-2020-2-28-37.
Full textRahim, Muheez A., Bilkisu Jimada-Ojuolape, Monsurat O. Balogun, and Lambe M. Adesina. "Security analysis in wireless networks." Caliphate Journal of Science and Technology 7, no. 1 (2025): 1–11. https://doi.org/10.4314/cajost.v7i1.01.
Full textJoshi, Kapil, Rajesh Kumar, Harishchander Anandaram, et al. "Network security in multiple threats: A critical study." Applied and Computational Engineering 19, no. 1 (2023): 253–58. http://dx.doi.org/10.54254/2755-2721/19/20231053.
Full textChander, Bhanu, Prem Kumar.B, and Kumaravelan . "A Analysis of Machine Learning in Wireless Sensor Network." International Journal of Engineering & Technology 7, no. 4.6 (2018): 185. http://dx.doi.org/10.14419/ijet.v7i4.6.20460.
Full textMalekzadeh, Mina, Abdul Azim Abdul Ghani, and Shamala Subramaniam. "Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/218271.
Full textMuhammad Faseeh Sultan, Sammia Hira, Sohail Masood Bhatti, and Allah Rakha. "Analysis of Machine Learning Methods for Intrusion Detection Systems in Wireless Networks." Bulletin of Business and Economics (BBE) 13, no. 2 (2024): 391–403. http://dx.doi.org/10.61506/01.00343.
Full textKundu, Vinit. "Beyond Wiretapping: The Power and Perils of Capturing Network Communication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32042.
Full textChakkarapani Sumathi, Thilagasree, Jayakumar Thippan, Brainy Joseph Raj Vikilal Joice, Pragathi Subramaniam, and Daekook Kang. "A comprehensive decision assessment for trust evaluation in wireless sensor networks." Yugoslav Journal of Operations Research, no. 00 (2024): 11. http://dx.doi.org/10.2298/yjor240217011c.
Full textLi, Feng. "Model for evaluating the security of wireless sensor network with fuzzy number intuitionistic fuzzy information." Journal of Intelligent & Fuzzy Systems 42, no. 4 (2022): 3559–73. http://dx.doi.org/10.3233/jifs-211731.
Full textKerrakchou, Imane, Sara Chadli, Yassine Ayachi, and Mohammed Saber. "Modeling the impact of jamming attacks in the internet of things." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 2 (2022): 1206–15. https://doi.org/10.11591/ijeecs.v26.i2.pp1206-1215.
Full textMubaraq, Ahmad Ridhani, Wawan Joko Pranoto, and Abdul Hallim. "Wireless Network Quality Analysis Using RMA and RSSI Methods at BPKAD Berau District." Journal of Computer Networks, Architecture and High Performance Computing 7, no. 2 (2025): 503–13. https://doi.org/10.47709/cnahpc.v7i2.5718.
Full textRusdan, Muchamad, and Muhamad Sabar. "Design and Analysis of Wireless Network with Wireless Distribution System using Multi-Factor Authentication-based User Authentication." Journal of Information Technology 2, no. 1 (2020): 17–24. http://dx.doi.org/10.47292/joint.v2i1.004.
Full textTran, Tung Duong. "Resource Allocation in Air Base Station-Enabled Wireless Network: Survey." Telecom IT 12, no. 2 (2024): 40–47. https://doi.org/10.31854/2307-1303-2024-12-2-40-47.
Full textGowda, V. Dankan, D. Palanikkumar, Sajja Suneel, Satish Dekka, T. Thiruvenkadam, and K. D. V. Prasad. "Cryptographic image-based data security strategies in wireless sensor networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 293–304. http://dx.doi.org/10.47974/jdmsc-1883.
Full textKerrakchou, Imane, Sara Chadli, Yassine Ayachi, and Mohammed Saber. "Modeling the impact of jamming attacks in the internet of things." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 2 (2022): 1206. http://dx.doi.org/10.11591/ijeecs.v26.i2.pp1206-1215.
Full textC. Visalatchi. "Enhancing Network Security in Wireless Sensor Networks through Rsa-Based Secure Memory Management and Optimized Resource Allocation: A Comprehensive Survey." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 2777–97. https://doi.org/10.52783/cana.v32.4555.
Full textItagi, Manjunath, Dankan Gowda V, KDV Prasad, Pullela SVVSR Kumar, Shekhar R, and B. Ashreetha. "Performance Analysis of Energy Efficiency and Security Solutions of Internet of Things Protocols." International Journal of Electrical and Electronics Research 11, no. 2 (2023): 442–50. http://dx.doi.org/10.37391/ijeer.110226.
Full textERMOSHINA, Elizaveta E. "The use of neural networks in the analysis of economic security of the university." Economic Analysis: Theory and Practice 22, no. 4 (2023): 732–48. http://dx.doi.org/10.24891/ea.22.4.732.
Full textAsonze, Christopher Uzoma, Olumide Samuel Ogungbemi, Favour Amarachi Ezeugwa, Anthony Obulor Olisa, Oluwaseun Ibrahim Akinola, and Oluwaseun Oladeji Olaniyi. "Evaluating the Trade-offs between Wireless Security and Performance in IoT Networks: A Case Study of Web Applications in AI-Driven Home Appliances." Journal of Engineering Research and Reports 26, no. 8 (2024): 411–32. http://dx.doi.org/10.9734/jerr/2024/v26i81255.
Full textSharipuddin, Rafi Septiandi Putra, M. Farhan Aulia, Sayid Achmad Maulana, and Pareza Alam Jusia. "Android Security: Malware Detection with Convolutional Neural Network and Feature Analysis." Media Journal of General Computer Science 1, no. 1 (2023): 7–13. http://dx.doi.org/10.62205/mjgcs.v1i1.7.
Full textPuinko, L. E., and E. V. Tolkacheva. "Analysis of Threats to Information Security of Public Authorities Using Neural Networks." Modelling and Data Analysis 14, no. 3 (2024): 7–21. http://dx.doi.org/10.17759/mda.2024140301.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Oleksandr Volos, and Mykola Tarnovskyi. "METHOD AND MEANS OF SECURITY MONITORING IN A COMPUTER NETWORK BY SIEM MEANS." Information technology and computer engineering 58, no. 3 (2023): 22–32. http://dx.doi.org/10.31649/1999-9941-2023-58-3-22-32.
Full textKhaytbaev, A. E., and A. M. Eshmuradov. "APPLICATIONS OF NEURAL NETWORK TECHNOLOGIES IN WIRELESS SENSOR NETWORKS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 195 (September 2020): 46–51. http://dx.doi.org/10.14489/vkit.2020.09.pp.046-051.
Full textKhaytbaev, A. E., and A. M. Eshmuradov. "APPLICATIONS OF NEURAL NETWORK TECHNOLOGIES IN WIRELESS SENSOR NETWORKS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 195 (September 2020): 46–51. http://dx.doi.org/10.14489/vkit.2020.09.pp.046-051.
Full textSheikh, Muhammad Sameer, and Jun Liang. "A Comprehensive Survey on VANET Security Services in Traffic Management System." Wireless Communications and Mobile Computing 2019 (September 15, 2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.
Full textWaili, Abdul Rasul AL. "Analysis of Traffic Using the Snort Tool for the Detection of Malware Traffic." April-May 2023, no. 33 (May 24, 2023): 30–37. http://dx.doi.org/10.55529/ijitc.33.30.37.
Full textAshlesha, S. Nagdive, Tugnayat Rajkishor, and Peshkar Atharva. "Social Network Analysis of Terrorist Networks." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 2553–59. https://doi.org/10.35940/ijeat.C5431.029320.
Full textAsemi, Asefeh, and Fezzeh Ebrahimi. "A Thematic Analysis of the Articles on the Internet of Things in the Web of Science With HAC Approach." International Journal of Distributed Systems and Technologies 11, no. 2 (2020): 1–17. http://dx.doi.org/10.4018/ijdst.2020040101.
Full textPalanisamy, Ramaraj, and Yang Wu. "Users’ attitude on perceived security of enterprise systems mobility: an empirical study." Information & Computer Security 29, no. 1 (2021): 159–86. http://dx.doi.org/10.1108/ics-05-2020-0069.
Full textAnggi Rachmawati and Yossaepurrohman. "Analysis of Machine Learning Systems for Cyber Physical Systems." International Transactions on Education Technology (ITEE) 1, no. 1 (2022): 1–9. http://dx.doi.org/10.34306/itee.v1i1.170.
Full textAnggi Rachmawati and Yossaepurrohman. "Analysis of Machine Learning Systems for Cyber Physical Systems." International Transactions on Education Technology (ITEE) 1, no. 1 (2022): 1–9. http://dx.doi.org/10.33050/itee.v1i1.170.
Full textAboelfotoh, Said F., and Noha A. Hikal. "A Review of Cyber-security Measuring and Assessment Methods for Modern Enterprises." JOIV : International Journal on Informatics Visualization 3, no. 2 (2019): 157. http://dx.doi.org/10.30630/joiv.3.2.239.
Full textKN, Swethaa. "Hidden Device Detector." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem43456.
Full textHerman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.
Full textChen, Jialong, Jingjing Xiao, and Jiaxin Xu. "VGGIncepNet: Enhancing Network Intrusion Detection and Network Security through Non-Image-to-Image Conversion and Deep Learning." Electronics 13, no. 18 (2024): 3639. http://dx.doi.org/10.3390/electronics13183639.
Full textFan, Xin, and Yan Huo. "Cooperative secure transmission against collusive eavesdroppers in Internet of Things." International Journal of Distributed Sensor Networks 16, no. 6 (2020): 155014772093346. http://dx.doi.org/10.1177/1550147720933464.
Full textDr. Abhinandan Singh Dandotiya, Palash Sharma, Bharti gole, Shruti Dubey, and Dr. Nidhi Dandotiya. "An Empirical Analysis of DDoS Attack Detection and Mitigation Techniques: A Comparative Review of Tools and Methods." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1099–108. https://doi.org/10.32628/cseit2410462.
Full textVIKULOV, Sergei F., and Sergei V. STULOV. "Conceptual approaches to ensuring the system of military-economic security of the CSTO member states in the new geopolitical conditions." National Interests: Priorities and Security 18, no. 3 (2022): 408–25. http://dx.doi.org/10.24891/ni.18.3.408.
Full textKhan, Shafiullah, Muhammad Altaf Khan, and Noha Alnazzawi. "Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks." Sensors 24, no. 5 (2024): 1641. http://dx.doi.org/10.3390/s24051641.
Full textSubhash Singh Parihar. "Distributed and Hierarchical Clustering in Wireless Camera Sensor Networks leading to Internet of Things." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 100–117. https://doi.org/10.52783/jisem.v10i13s.2010.
Full textNevliudov, Igor, Andrii Sliusar, Sofiia Khrustalova, and Kirill Khrustalev. "AUTOMATED RESOURCE MANAGEMENT SYSTEM FOR THE UTILITY SECTOR BASED ON WIRELESS SENSOR NETWORKS." Innovative Technologies and Scientific Solutions for Industries, no. 1 (23) (April 20, 2023): 184–96. http://dx.doi.org/10.30837/itssi.2023.23.184.
Full text