Artículos de revistas sobre el tema "Wi-Fi attacks"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Wi-Fi attacks".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Dagelić, Ante, Toni Perković, Bojan Vujatović y Mario Čagalj. "SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists". Wireless Communications and Mobile Computing 2018 (22 de julio de 2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.
Texto completoReyes-Moncayo, Hector Ivan, Luis Daniel Malaver- Mendoza y Andrea Lorena Ochoa-Murillo. "Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames". Scientia et Technica 25, n.º 3 (30 de septiembre de 2020): 351–57. http://dx.doi.org/10.22517/23447214.23781.
Texto completoKohlios, Christopher y Thaier Hayajneh. "A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3". Electronics 7, n.º 11 (30 de octubre de 2018): 284. http://dx.doi.org/10.3390/electronics7110284.
Texto completo., Rabia, Naveed Ali, Shahzaib Ali, Ahthasham Sajid y Afia Zafar. "A SECURITY REVIEW OVER WI-FI AND LI-FI". Information Management and Computer Science 3, n.º 1 (6 de abril de 2020): 01–09. http://dx.doi.org/10.26480/imcs.01.2020.01.09.
Texto completoChen, Yongle, Xiaojian Wang, Yuli Yang y Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract". Sensors 20, n.º 4 (15 de febrero de 2020): 1062. http://dx.doi.org/10.3390/s20041062.
Texto completoXin, Liangxiao, David Starobinski y Guevara Noubir. "Cascading Attacks on Wi-Fi Networks: Theory and Experiments". IEEE Transactions on Control of Network Systems 7, n.º 4 (diciembre de 2020): 1757–68. http://dx.doi.org/10.1109/tcns.2020.2999452.
Texto completoA. Reyes, Abel, Francisco D. Vaca, Gabriel A. Castro Aguayo, Quamar Niyaz y Vijay Devabhaktuni. "A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System". Electronics 9, n.º 10 (15 de octubre de 2020): 1689. http://dx.doi.org/10.3390/electronics9101689.
Texto completoPark, Min-Woo, Young-Hyun Choi, Jung-Ho Eom y Tai-Myoung Chung. "Dangerous Wi-Fi access point: attacks to benign smartphone applications". Personal and Ubiquitous Computing 18, n.º 6 (29 de octubre de 2013): 1373–86. http://dx.doi.org/10.1007/s00779-013-0739-y.
Texto completoXin, Liangxiao y David Starobinski. "Countering Cascading Denial of Service Attacks on Wi-Fi Networks". IEEE/ACM Transactions on Networking 29, n.º 3 (junio de 2021): 1335–48. http://dx.doi.org/10.1109/tnet.2021.3062363.
Texto completoSharma, Kavita y B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices". International Journal of E-Services and Mobile Applications 10, n.º 2 (abril de 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Texto completoFong, Ken Kin-Kiu y Stanley Kam Sing Wong. "Wi-Fi Adoption and Security in Hong Kong". Asian Social Science 12, n.º 6 (20 de mayo de 2016): 1. http://dx.doi.org/10.5539/ass.v12n6p1.
Texto completoIlham Firdaus, Januar Al Amien y Soni Soni. "String Matching untuk Mendeteksi Serangan Sniffing (ARP Spoofing) pada IDS Snort". Jurnal CoSciTech (Computer Science and Information Technology) 1, n.º 2 (31 de octubre de 2020): 44–49. http://dx.doi.org/10.37859/coscitech.v1i2.2180.
Texto completoSharma, Kavita y B. B. Gupta. "Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel". Procedia Computer Science 78 (2016): 19–25. http://dx.doi.org/10.1016/j.procs.2016.02.005.
Texto completoElhamahmy, M. y T. Sobh. "Preventing Information Leakage Caused by War Driving Attacks in Wi-Fi Networks". International Conference on Aerospace Sciences and Aviation Technology 14, AEROSPACE SCIENCES (1 de mayo de 2011): 1–9. http://dx.doi.org/10.21608/asat.2011.23405.
Texto completoKalniņš, Rūdolfs, Jānis Puriņš y Gundars Alksnis. "Security Evaluation of Wireless Network Access Points". Applied Computer Systems 21, n.º 1 (24 de mayo de 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.
Texto completoMirzoev, Timur y Joel Stacey White. "The Role of Client Isolation in Protecting Wi-Fi Users from ARP Spoofing Attacks". i-manager's Journal on Information Technology 1, n.º 2 (15 de mayo de 2012): 11–17. http://dx.doi.org/10.26634/jit.1.2.1779.
Texto completoNivaashini, M. y P. Thangaraj. "Computational intelligence techniques for automatic detection of Wi-Fi attacks in wireless IoT networks". Wireless Networks 27, n.º 4 (15 de abril de 2021): 2761–84. http://dx.doi.org/10.1007/s11276-021-02594-2.
Texto completoTang, Zhanyong, Yujie Zhao, Lei Yang, Shengde Qi, Dingyi Fang, Xiaojiang Chen, Xiaoqing Gong y Zheng Wang. "Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes". Mobile Information Systems 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1248578.
Texto completoKovtsur, M., A. Kistruga, G. Voroshnin y A. Fedorova. "Research of authentication failure and ARP inject attacks and methods of their detection in IEEE 802.11 networks". Telecom IT 9, n.º 1 (31 de marzo de 2021): 87–98. http://dx.doi.org/10.31854/2307-1303-2021-9-1-87-98.
Texto completoAbdul Malik, Mohd Mirza, Mohd Nizam Osman y Mushahadah Maghribi. "Monitoring and Evaluating Open Wireless LAN using Hybrid IDS". Journal of Computing Research and Innovation 4, n.º 2 (14 de noviembre de 2019): 60–67. http://dx.doi.org/10.24191/jcrinn.v4i2.118.
Texto completoIVANCIU, M. y M. ALEXANDRU. "Antidrone Wireless Personal Shield". Bulletin of the Transilvania University of Brasov. Series I - Engineering Sciences 13(62), n.º 2 (26 de enero de 2021): 9–14. http://dx.doi.org/10.31926/but.ens.2020.13.62.1.8.
Texto completoVitomsky, E. V. y D. N. Somov. "Methods for protecting local wireless network aimed at providing temporary silency of signals and information interaction structure". Issues of radio electronics, n.º 3 (26 de abril de 2020): 35–40. http://dx.doi.org/10.21778/2218-5453-2020-3-35-40.
Texto completoMugavero, Roberto, Stanislav Abaimov, Federico Benolli y Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)". International Journal of Information Systems for Crisis Response and Management 10, n.º 2 (abril de 2018): 49–78. http://dx.doi.org/10.4018/ijiscram.2018040103.
Texto completoThompson, Aderonke F., Oghenerukevwe E. Oyinloye, Matthew T. David y Boniface K. Alese. "A Secured System for Internet Enabled Host Devices". Network and Communication Technologies 5, n.º 1 (6 de febrero de 2020): 26. http://dx.doi.org/10.5539/nct.v5n1p26.
Texto completoLu, Qian, Haipeng Qu, Yuzhan Ouyang y Jiahui Zhang. "SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames". Security and Communication Networks 2019 (2 de junio de 2019): 1–10. http://dx.doi.org/10.1155/2019/2718741.
Texto completoGaber, Tarek, Yassine El Jazouli, Esraa Eldesouky y Ahmed Ali. "Autonomous Haulage Systems in the Mining Industry: Cybersecurity, Communication and Safety Issues and Challenges". Electronics 10, n.º 11 (7 de junio de 2021): 1357. http://dx.doi.org/10.3390/electronics10111357.
Texto completoDevi, P. Prasanya, R. S. Kannan y M. Ravindran. "A Novel Analysis of Wireless Network Monitoring using Wireshark". Restaurant Business 118, n.º 7 (28 de julio de 2019): 27–33. http://dx.doi.org/10.26643/rb.v118i7.7243.
Texto completoChuchaev, Alexandr, Yulia Gracheva y Sergey Malikov. "Attacks on the Information System of Unmanned Vehicles in the Etiology of Road Accidents". Russian Journal of Criminology 15, n.º 1 (9 de marzo de 2021): 55–67. http://dx.doi.org/10.17150/2500-4255.2021.15(1).55-67.
Texto completoPecorella, Tommaso, Laura Pierucci y Francesca Nizzi. "“Network Sentiment” Framework to Improve Security and Privacy for Smart Home". Future Internet 10, n.º 12 (19 de diciembre de 2018): 125. http://dx.doi.org/10.3390/fi10120125.
Texto completoPerković, T., A. Dagelić, M. Bugarić y M. Čagalj. "On WPA2-Enterprise Privacy in High Education and Science". Security and Communication Networks 2020 (7 de septiembre de 2020): 1–11. http://dx.doi.org/10.1155/2020/3731529.
Texto completoGu, Xiaolin, Wenjia Wu, Xiaodan Gu, Zhen Ling, Ming Yang y Aibo Song. "Probe Request Based Device Identification Attack and Defense". Sensors 20, n.º 16 (17 de agosto de 2020): 4620. http://dx.doi.org/10.3390/s20164620.
Texto completoGiles, Jim. "City Wi-Fi networks vulnerable to virus attack". New Scientist 201, n.º 2693 (enero de 2009): 19. http://dx.doi.org/10.1016/s0262-4079(09)60277-3.
Texto completoLee, Il-Gu, Kyungmin Go y Jung Hoon Lee. "Battery Draining Attack and Defense against Power Saving Wireless LAN Devices". Sensors 20, n.º 7 (5 de abril de 2020): 2043. http://dx.doi.org/10.3390/s20072043.
Texto completoDondyk, Erich, Louis Rivera y Cliff C. Zou. "Wi-Fi access denial of service attack to smartphones". International Journal of Security and Networks 8, n.º 3 (2013): 117. http://dx.doi.org/10.1504/ijsn.2013.057698.
Texto completoOmollo, Vincent N. y Ruth K. Chweya. "Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol". Universal Journal of Communications and Network 3, n.º 2 (mayo de 2015): 35–40. http://dx.doi.org/10.13189/ujcn.2015.030201.
Texto completoBartoli, Alberto. "Understanding Server Authentication in WPA3 Enterprise". Applied Sciences 10, n.º 21 (6 de noviembre de 2020): 7879. http://dx.doi.org/10.3390/app10217879.
Texto completoBae, Hee-Ra, Min-Young Kim, Su-Kyung Song, Seul-Gi Lee y Young-Hyun Chang. "Security Attack Analysis for Wireless Router and Free Wi-Fi Hacking Solutions". Journal of the convergence on culture technology 2, n.º 4 (30 de diciembre de 2016): 65–70. http://dx.doi.org/10.17703/jcct.2016.2.4.65.
Texto completoFaisol, Ahmad y Imam Izzat Muttaqin. "IMPLEMENTASI SENSOR MONITORING PADA JARINGAN WI-FI (HOTSPOT) BERBASIS SNORT". Jurnal Teknologi Informasi dan Terapan 5, n.º 2 (3 de abril de 2019): 141–46. http://dx.doi.org/10.25047/jtit.v5i2.92.
Texto completoAgarwal, Mayank, Santosh Biswas y Sukumar Nandi. "Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks". IEEE Communications Letters 19, n.º 4 (abril de 2015): 581–84. http://dx.doi.org/10.1109/lcomm.2015.2400443.
Texto completoKo, DongHyun, Seok-Hwan Choi, Sungyong Ahn y Yoon-Ho Choi. "Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack". Sensors 20, n.º 23 (26 de noviembre de 2020): 6756. http://dx.doi.org/10.3390/s20236756.
Texto completoNakhila, Omar, Muhammad Faisal Amjad, Erich Dondyk y Cliff Zou. "Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients". Computers & Security 74 (mayo de 2018): 41–54. http://dx.doi.org/10.1016/j.cose.2017.12.009.
Texto completoDu, Yi-Hong y Shi-Hua Liu. "Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks". Security and Communication Networks 2018 (7 de junio de 2018): 1–7. http://dx.doi.org/10.1155/2018/4691203.
Texto completoRizzi, Antonello, Giuseppe Granato y Andrea Baiocchi. "Frame-by-frame Wi-Fi attack detection algorithm with scalable and modular machine-learning design". Applied Soft Computing 91 (junio de 2020): 106188. http://dx.doi.org/10.1016/j.asoc.2020.106188.
Texto completoS, Smys, Haoxiang Wang y Abul Basar. "5G Network Simulation in Smart Cities using Neural Network Algorithm". March 2021 3, n.º 1 (29 de marzo de 2021): 43–52. http://dx.doi.org/10.36548/jaicn.2021.1.004.
Texto completoPark, Geun-Duk, Jeong-Soo Park y Jae-Cheol Ha. "A Secure WPA-PSK Protocol Resistant to Dictionary Attack on Smartphone Communication Using Wi-Fi Channel". Journal of the Korea Academia-Industrial cooperation Society 13, n.º 4 (30 de abril de 2012): 1839–48. http://dx.doi.org/10.5762/kais.2012.13.4.1839.
Texto completoAgarwal, Mayank, Santosh Biswas y Sukumar Nandi. "An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks". International Journal of Wireless Information Networks 25, n.º 2 (29 de marzo de 2018): 130–45. http://dx.doi.org/10.1007/s10776-018-0396-1.
Texto completoYun, Junhyeok y Mihui Kim. "SybilEye: Observer-Assisted Privacy-Preserving Sybil Attack Detection on Mobile Crowdsensing". Information 11, n.º 4 (9 de abril de 2020): 198. http://dx.doi.org/10.3390/info11040198.
Texto completoSingh, Alka y Chitra Singh. "Quad-band FSS for Electromagnetic Shielding". International Journal of Computer Communication and Informatics 3, n.º 1 (30 de mayo de 2021): 1–14. http://dx.doi.org/10.34256/ijcci2111.
Texto completoJohnson, Tyler, Daniel Roggow, Phillip H. Jones y Joseph Zambreno. "An FPGA Architecture for the Recovery of WPA/WPA2 Keys". Journal of Circuits, Systems and Computers 24, n.º 07 (17 de junio de 2015): 1550105. http://dx.doi.org/10.1142/s0218126615501054.
Texto completoHsneh, Yu Hsiang, Fu Hau Hsu, Shih Jen Chen, Yao Hsin Chen, Yan Ling Hwang, Chuan Sheng Wang y Yu Liang Hsu. "ET Detector: A Client-Based Solution to Detect an Evil Twin Access Point". Applied Mechanics and Materials 764-765 (mayo de 2015): 900–904. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.900.
Texto completo