Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3
zadetkov: 26
1.
  • How is your Wi-Fi connectio... How is your Wi-Fi connection today? DoS attacks on WPA3-SAE
    Chatzoglou, Efstratios; Kambourakis, Georgios; Kolias, Constantinos Journal of information security and applications, February 2022, 2022-02-00, Letnik: 64
    Journal Article
    Recenzirano
    Odprti dostop

    WPA3-Personal renders the Simultaneous Authentication of Equals (SAE) password-authenticated key agreement method mandatory. The scheme achieves forward secrecy and is highly resistant to offline ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ

PDF
2.
  • A Chosen Random Value Attac... A Chosen Random Value Attack on WPA3 SAE Authentication Protocol
    Sun, Sheng Digital threats (Print), 06/2022, Letnik: 3, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Simultaneous Authentication of Equals (SAE) is a password-authenticated key exchange protocol that is designed to replace the WPA2-PSK-based authentication. The SAE authenticated key exchange ...
Celotno besedilo
Dostopno za: NUK, UL, UM

PDF
3.
  • Empirical Evaluation of Att... Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset
    Chatzoglou, Efstratios; Kambourakis, Georgios; Kolias, Constantinos IEEE access, 2021, Letnik: 9
    Journal Article
    Recenzirano
    Odprti dostop

    This work serves two key objectives. First, it markedly supplements and extends the well-known AWID corpus by capturing and studying traces of a wide variety of attacks hurled in the IEEE 802.1X ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
4.
  • ANALYZING AND EVALUATING TH... ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY
    Shadeed Al-Mejibli, Intisar; Rasheed Alharbe, Dr. Nawaf Iraqi journal for computers and informatics (Online), 06/2020, Letnik: 46, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
5.
  • Lightweight real-time WiFi-... Lightweight real-time WiFi-based intrusion detection system using LightGBM
    Bhutta, Areeb Ahmed; Nisa, Mehr un; Mian, Adnan Noor Wireless networks, 02/2024, Letnik: 30, Številka: 2
    Journal Article
    Recenzirano

    Attacks on WiFi networks can cause network failures and denial of service for authentic users. To identify such attacks, the deployment of a WiFi Intrusion Detection System (IDS) is crucial. The key ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
6.
  • Exploiting WiFi usability f... Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls
    Chatzisofroniou, George; Kotzanikolaou, Panayiotis Journal of computer security, 01/2022, Letnik: 30, Številka: 3
    Journal Article
    Recenzirano

    Association attacks aim to manipulate WiFi clients into associating with a malicious access point, by exploiting protocol vulnerabilities and usability features implemented on the network managers of ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
7.
  • A Wireless Intrusion Detection System for 802.11 WPA3 Networks
    Dalal, Neil; Akhtar, Nadeem; Gupta, Anubhav ... 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022-Jan.-4
    Conference Proceeding
    Odprti dostop

    Wi-Fi (802.11) networks have become an essential part of our daily lives; hence, their security is of utmost importance. However, Wi-Fi Protected Access 3 (WPA3), the latest security certification ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
8.
  • Towards Understanding and E... Towards Understanding and Enhancing Association and Long Sleep in Low-Power WiFi IoT Systems
    Ramanna, Vikram Kumar; Sheth, Jaykumar; Liu, Simon ... IEEE transactions on green communications and networking, 12/2021, Letnik: 5, Številka: 4
    Journal Article

    Enhancing the energy efficiency of WiFi IoT stations introduces unique challenges compared to 802.15.4 and BLE. The four essential operations performed to ensure connectivity between stations and the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
9.
  • Wireless Security Protocols... Wireless Security Protocols WPA3: A Systematic Literature Review
    Halbouni, Asmaa; Ong, Lee-Yeng; Leow, Meng-Chew IEEE access, 2023, Letnik: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The size of wireless networks and the number of wireless devices are growing daily. A crucial part of wireless security involves preventing unauthorized access by using wireless security protocols in ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
10.
  • A Comprehensive Attack Flow... A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3
    Kohlios, Christopher P.; Hayajneh, Thaier Electronics (Basel), 11/2018, Letnik: 7, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The presence of wireless communication grows undeniably more prevalent each year. Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks (WLAN) in 1997, technologies have ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2 3
zadetkov: 26

Nalaganje filtrov