Effects of the wpa2 krack attack in real environment

DJ Fehér, B Sandor - 2018 IEEE 16th international symposium …, 2018 - ieeexplore.ieee.org
The World's most used Wi-Fi protocol, the WPA2, contained vulnerability and several
problems discovered and published by cybersecurity researchers. It has affected the IT …

[Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique

VO Etta, A Sari, AL Imoize, PK Shukla… - Mobile Information …, 2022 - Wiley Online Library
This study aims to investigate Wireless Local Area Network (WLAN) within the context of its
applicability as a 21st‐century business tool and its survivability in a security threat‐infested …

[HTML][HTML] A systematic methodology for continuous WLAN abundance and security analysis

S Lindroos, A Hakkala, S Virtanen - Computer Networks, 2021 - Elsevier
In this paper, we present a systematic methodology for continuous surveying and analysis of
802.11 Wireless Local Area Network (WLAN) abundance and security, based on the passive …

A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit

W Feng, Y Wu, Y Fan - International Journal of Intelligent Computing …, 2020 - emerald.com
Purpose The purpose of this paper is to solve the shortage of the existing methods for the
prediction of network security situations (NSS). Because the conventional methods for the …

A study of Wi-Fi security in city environment

H Valchanov, J Edikyan… - IOP Conference Series …, 2019 - iopscience.iop.org
Wireless networks are widely used with increasing number of users. Typically, they are
based on the IEEE 802.11 standard (Wi-Fi). Because of its broadcast nature, they are very …

What is stopping Agriculture 4.0?---Examples from China

Y Wu, K Takács-György - 2023 IEEE 17th International …, 2023 - ieeexplore.ieee.org
As the Fourth Industrial Revolution emerged, Agriculture 4.0 started a new page of
agriculture. Thanks to the rapid development of advanced and accurate technologies …

Battle of the bands: a long-term analysis of frequency band and channel distribution development in WLANs

S Lindroos, A Hakkala, S Virtanen - IEEE Access, 2022 - ieeexplore.ieee.org
In this article, we present the results of a long-term analysis of Wireless Local Area Network
(WLAN) frequency band and channel distribution development. To the best of our …

Beyond the potential of 5G

E Kadena, Z Rajnai - 2023 IEEE 21st World Symposium on …, 2023 - ieeexplore.ieee.org
The lower latency and bandwidth of 5G will cause an increase in the diversity and volume of
data, Internet of Things (IoT) devices, and innovation, which can create several challenges …

Wireless networks and critical information infrastructure

Z Illési, A Halász, PJ Varga - 2018 IEEE 12th International …, 2018 - ieeexplore.ieee.org
The dynamic development of economy greatly benefits from the penetration of information
and communication technology. The rapid expansion of the use of portable info …

DDoS attack security situation assessment model using fusion feature based on fuzzy C-means clustering algorithm

R Zhang, J Cheng, X Tang, Q Liu, X He - … 2018, Haikou, China, June 8-10 …, 2018 - Springer
DDoS attacks have impaired the network availability seriously in the new network
environment and the traditional network situation assessment methods cannot effectively …