Malware spreading model for routers in Wi-Fi networks

DT Le, TT Tran, KQ Dang, R Alkanhel… - IEEE Access, 2022 - ieeexplore.ieee.org
Malware attacks have become very common in recent years. The variety and continuous
improvement of malware capabilities threaten any network. Wi-Fi is also not an exception in …

[PDF][PDF] A Software-defined Networking-based Detection and Mitigation Approach against KRACK.

Y Li, M Serrano, T Chin, K Xiong, J Lin - ICETE (2), 2019 - scitepress.org
Most modern Wi-Fi networks are secured by the Wi-Fi Protected Access II (WPA2) protocol
that uses a 4-way handshake. Serious weaknesses have been discovered in this 4-way …

Wi-fi network vulnerability analysis and risk assessment in Lebanon

E Nasr, M Jalloul, J Bachalaany… - MATEC Web of …, 2019 - matec-conferences.org
The aim of this paper is to analyze the Wi-Fi network vulnerabilities and risk assessment in
Lebanon in order to raise awareness to the Lebanese public by informing them of threats …

Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices

L Li, L Yu, C Yang, J Gou, J Yin, X Gong - Information Security and Privacy …, 2020 - Springer
Firmware security is always a focus of IoT security in recent years. The security of office
automation device's firmware also attracts widespread attention. Previous work on attacking …

Countermeasures against various network attacks using machine learning methods

Y Li - 2020 - search.proquest.com
With the rapid development of a computer network, our lives are already inseparable from it.
Wireless Fidelity (Wi-Fi) is in use everywhere; more and more devices are connected to the …

[引用][C] ОБЗОР АТАК НА БЕСПРОВОДНЫЕ ЛОКАЛЬНЫЕ СЕТИ СЕМЕЙСТВА IEEE 802.11

КИ Цимбалов - Молодой исследователь: вызовы и перспективы, 2021 - elibrary.ru
В статье представлен обзор различных по реализации атак, на локальные
беспроводные сети семейства IEEE 802.11.