DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 78
1.
  • Empirical Evaluation of Att... Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset
    Chatzoglou, Efstratios; Kambourakis, Georgios; Kolias, Constantinos IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    This work serves two key objectives. First, it markedly supplements and extends the well-known AWID corpus by capturing and studying traces of a wide variety of attacks hurled in the IEEE 802.1X ...
Full text
Available for: UL

PDF
2.
  • An Enhanced WLAN Security S... An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications
    Hayajneh, Thaier; Ullah, Sana; Mohd, Bassam J. ... IEEE systems journal, 12/2017, Volume: 11, Issue: 4
    Journal Article
    Peer reviewed

    Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network ...
Full text
Available for: UL
3.
  • Quest: instant questionnair... Quest: instant questionnaire collection from handshake messages using WLAN
    Zhu, Xiaojun; Han, Hao Wireless networks, 05/2024, Volume: 30, Issue: 4
    Journal Article
    Peer reviewed

    A common approach for questionnaire collection is to set up a WLAN and respondents submit answers via specific apps or a web browser. However, much unnecessary background traffic is incurred once a ...
Full text
Available for: UL
4.
  • ANALYZING AND EVALUATING TH... ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY
    Shadeed Al-Mejibli, Intisar; Rasheed Alharbe, Dr. Nawaf Iraqi journal for computers and informatics (Online), 06/2020, Volume: 46, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been ...
Full text
Available for: UL

PDF
5.
  • Lightweight real-time WiFi-... Lightweight real-time WiFi-based intrusion detection system using LightGBM
    Bhutta, Areeb Ahmed; Nisa, Mehr un; Mian, Adnan Noor Wireless networks, 02/2024, Volume: 30, Issue: 2
    Journal Article
    Peer reviewed

    Attacks on WiFi networks can cause network failures and denial of service for authentic users. To identify such attacks, the deployment of a WiFi Intrusion Detection System (IDS) is crucial. The key ...
Full text
Available for: UL
6.
  • Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras
    Neal, Zachary; Sha, Kewei 2023 32nd International Conference on Computer Communications and Networks (ICCCN), 2023-July
    Conference Proceeding

    Millions of Wi-Fi cameras have been deployed in businesses and households in the last decade. Most of them are used to provide security surveillance services. It raises new security concerns because ...
Full text
Available for: UL
7.
  • CheckShake: Passively Detec... CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning
    Agrawal, Anand; Chatterjee, Urbi; Maiti, Rajib Ranjan IEEE transactions on dependable and secure computing, 11/2023, Volume: 20, Issue: 6
    Journal Article

    Recently, a number of attacks have been demonstrated (like key reinstallation attack, called KRACK) on WPA2 protocol suite in Wi-Fi WLAN, for which a patching is often challenging. In this paper, we ...
Full text
Available for: UL
8.
  • Exploiting WiFi usability f... Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls
    Chatzisofroniou, George; Kotzanikolaou, Panayiotis Journal of computer security, 01/2022, Volume: 30, Issue: 3
    Journal Article
    Peer reviewed

    Association attacks aim to manipulate WiFi clients into associating with a malicious access point, by exploiting protocol vulnerabilities and usability features implemented on the network managers of ...
Full text
Available for: UL
9.
  • Towards Understanding and E... Towards Understanding and Enhancing Association and Long Sleep in Low-Power WiFi IoT Systems
    Ramanna, Vikram Kumar; Sheth, Jaykumar; Liu, Simon ... IEEE transactions on green communications and networking, 12/2021, Volume: 5, Issue: 4
    Journal Article

    Enhancing the energy efficiency of WiFi IoT stations introduces unique challenges compared to 802.15.4 and BLE. The four essential operations performed to ensure connectivity between stations and the ...
Full text
Available for: UL
10.
  • Wi-Fi Security Analysis Wi-Fi Security Analysis
    Mekhaznia, Tahar; Zidani, Abdelmadjid Procedia computer science, 2015, 2015-00-00, Volume: 73
    Journal Article
    Peer reviewed
    Open access

    In recent years, a significant increasing in development of Wireless networks is noticed; they become an entire part of the Internet and demonstrate effectiveness in handling communication for ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 78

Load filters