Current threats of wireless networks
暂无分享,去创建一个
[1] Chao Yang,et al. Who is peeping at your passwords at Starbucks? — To catch an evil twin access point , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[2] Noora Al Mutawa,et al. Forensics and war-driving on unsecured wireless network , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[3] S Vinjosh Reddy,et al. Wireless hacking - a WiFi hack by cracking WEP , 2010, 2010 2nd International Conference on Education Technology and Computer.
[4] Xiaohong Yuan,et al. Cloud computing and security challenges , 2012, ACM-SE '12.
[5] Kun Yang,et al. A Random Packet Destruction DoS Attack for Wireless Networks , 2008, 2008 IEEE International Conference on Communications.
[6] Adrian Hannah. Packet sniffing basics , 2011 .
[7] Amit Dvir,et al. A joint framework of passive monitoring system for complex wireless networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[8] Guangzhi Qu,et al. RAPiD: An indirect rogue access points detection system , 2010, International Performance Computing and Communications Conference.
[9] Loukas Lazos,et al. Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.
[10] Hong Huang,et al. On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network , 2011, IEEE Transactions on Wireless Communications.
[11] Li Hui,et al. Mobile jamming attack in clustering wireless sensor network , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[12] Ajaz Hussain Mir,et al. Quantification of the Effect of Security on Performance in Wireless LANs , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[13] Saurabh Dey,et al. The sneeze algorithm: A social network & biomimetic approach for intrusion detection in wireless networks , 2010, 2010 IEEE International Workshop on: Business Applications of Social Network Analysis (BASNA).
[14] Mazdak Zamani,et al. A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[15] Kai Cui,et al. A research into the latent danger of WLAN , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).
[16] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[17] Andrew Vladimirov,et al. Wi-Foo II: The Secrets of Wireless Hacking (2nd Edition) , 2007 .
[18] Phivos Mylonas,et al. Real-Life Paradigms of Wireless Network Security Attacks , 2011, 2011 15th Panhellenic Conference on Informatics.
[19] Sanjay Kumar Jena,et al. Security in Bluetooth, RFID and wireless sensor networks , 2011, ICCCS '11.