Information System for Connection to the Access Point with Encryption WPA2 Enterprise
暂无分享,去创建一个
[1] Petro Kravets,et al. The control agent with fuzzy logic , 2010, 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design.
[2] Emmanuel Tsekleves,et al. Exposing WPA2 security protocol vulnerabilities , 2014, Int. J. Inf. Comput. Secur..
[3] Vasyl Lytvyn,et al. Designing architecture of electronic content commerce system , 2015, 2015 Xth International Scientific and Technical Conference "Computer Sciences and Information Technologies" (CSIT).
[4] Lyubomyr Chyrun,et al. Intellectual system design for content formation , 2017, 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).
[5] Jiang Li,et al. Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[6] Mohammed Mahmudur Rahman,et al. A comparative study of WLAN security protocols: WPA, WPA2 , 2015, 2015 International Conference on Advances in Electrical Engineering (ICAEE).
[7] Natalia Grabar,et al. COLINS 2018 (Computational Linguistics and Intelligent Systems) , 2018 .
[8] Arash Habibi Lashkari,et al. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[9] Victoria Vysotska,et al. Process analysis in electronic content commerce system , 2015, 2015 Xth International Scientific and Technical Conference "Computer Sciences and Information Technologies" (CSIT).
[10] Roel Verdult,et al. Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers , 2015, WOOT.
[11] B. Vijayakumar,et al. Cyber Security Scenarios and Control for Small and Medium Enterprises , 2012 .
[12] Marianne A. Azer,et al. A study in WPA2 enterprise recent attacks , 2017, 2017 13th International Computer Engineering Conference (ICENCO).
[13] Jerry Fjermestad,et al. Mobile and Connected Device Security Considerations: A Dilemma for Small and Medium Enterprise Business Mobility? , 2012, AMCIS.
[14] Sorin Andrei VISAN. WPA/WPA2 Password Security Testing using Graphics Processing Units , 2013 .
[15] Victoria Vysotska,et al. The Method of Web-Resources Management Under Conditions of Uncertainty Based on Fuzzy Logic , 2018, 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).
[16] Vasyl Lytvyn,et al. Development of the System to Integrate and Generate Content Considering the Cryptocurrent Needs of Users , 2019 .
[17] Victoria Vysotska,et al. Model and Architecture for Virtual Library Information System , 2018, 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).
[18] Tamara Radivilova,et al. Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise , 2017, 2017 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo).
[19] Bogdan Crainicu. Wireless LAN Security Mechanisms at the Enterprise and Home Level , 2008 .
[20] Mark A. Harris,et al. Mobile device security considerations for small- and medium-sized enterprise business mobility , 2014, Inf. Manag. Comput. Secur..
[21] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.
[22] Wim Lamotte,et al. Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles , 2014, WiSec '14.
[23] Victoria Vysotska,et al. Web Resources Management Method Based on Intelligent Technologies , 2018 .
[24] Arif Sari,et al. Comparative Analysis of Wireless Security Protocols: WEP vs WPA , 2015 .
[25] Yevhen Burov,et al. Method for Ontology Content and Structure Optimization, Provided by a Weighted Conceptual Graph , 2018, Webology.
[26] Eric Medvet,et al. Evil twins and WPA2 Enterprise: A coming security disaster? , 2018, Comput. Secur..
[27] Vasyl Lytvyn,et al. The Virtual Library System Design and Development , 2018 .
[28] Paul Arana,et al. Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) , 2006 .
[29] Anja Feldmann,et al. Towards programmable enterprise WLANS with Odin , 2012, HotSDN '12.
[30] Vasyl Lytvyn,et al. Architecture of System for Content Integration and Formation Based on Cryptographic Consumer Needs , 2018, 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).