Open Access
Issue |
MATEC Web Conf.
Volume 281, 2019
International Conference of Engineering Risk (INCER 2019)
|
|
---|---|---|
Article Number | 05002 | |
Number of page(s) | 8 | |
Section | Data Uncertainty and Security | |
DOI | https://doi.org/10.1051/matecconf/201928105002 | |
Published online | 21 May 2019 |
- C. Teyou and P. Zhang, "Solving Downgrade and DoS Attack Due to the Four Ways HandshakeVulnerabilities (WIFI)", International Journal of Engineering and Management Research, vol. 8, no. 4, (2018). Available: 10.31033/ijemr.8.4.1. [CrossRef] [Google Scholar]
- A. Makki, A. Siddig, M. Saad and C. Bleakley, "Survey of WiFi positioning using time-based techniques", Computer Networks, vol. 88, pp. 218-233, (2015). Available: 10.1016/j.comnet.2015.06.015. [CrossRef] [Google Scholar]
- S. Li, H. Li and L. Sun, "Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization", EURASIP Journal on Wireless Communications and Networking, vol. 2016, no. 1, (2016). Available: 10.1186/s13638-016-0624-2. [Google Scholar]
- S. Yousefi, H. Narui, S. Dayal, S. Ermon and S. Valaee, "A Survey on Behavior Recognition Using WiFi Channel State Information", IEEE Communications Magazine, vol. 55, no. 10, pp. 98-104, (2017). Available: 10.1109/mcom.2017.1700082. [CrossRef] [Google Scholar]
- S. Li, H. Li and L. Sun, "Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization", EURASIP Journal on Wireless Communications and Networking, vol. 2016, no. 1, (2016). Available: 10.1186/s13638-016-0624-2. [Google Scholar]
- K. ., "PROTECTION AGAINST INFORMATION LEAKAGE AND MALWARE WITH RISK FREE PUBLIC WIFI USAGE", International Journal of Research in Engineering and Technology, vol. 06, no. 04, pp. 64-66, (2017). Available: 10.15623/ijret.2017.0604015. [Google Scholar]
- Parsons, J. (2018). Hackers crack Wi–Fi security – ‘almost all‘ devices at risk say security experts. Available at: https://www.mirror.co.uk/tech/wifi–krack–security–hack–wpa2–11349768 [Google Scholar]
- How to Hack Wi–Fi: Cracking WEP Passwords with Aircrack–Ng. Available at: https://null–byte.wonderhowto.com/how–to/hack–wi–fi–cracking–wep–passwords–with–aircrack–ng–0147340/ [Google Scholar]
- Tools.kali.org. (2018). Kismet | Penetration Testing Tools. Available at: https://tools.kali.org/wireless–attacks/kismet [Google Scholar]
- E. Cole, "Cyber Defense | Insider Threat Risk Formula: Survivability, Risk, and Threat | SANS Institute", Cyber-defense.sans.org, (2012). [Online]. Available: https://cyber-defense.sans.org/blog/2012/10/23/insider-threat-risk-formula-survivability-risk-and-threat. [Google Scholar]
- "Wardriving: Legal or Illegal?", cmu95752. [Online]. Available: https://cmu95752.wordpress.com/2011/12/12/wardriving-legal-or-illegal/. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.