Biometric-based human recognition systems: an overview

D Palma, PL Montessoro - Recent Advances in Biometrics, 2022 - books.google.com
With the proliferation of automated systems for reliable and highly secure human
authentication and identification, the importance of technological solutions in biometrics is …

Security of unmanned aerial vehicle systems against cyber-physical attacks

C Rani, H Modares, R Sriram… - The Journal of …, 2016 - journals.sagepub.com
The federal aviation administration has estimated that by the year 2020, the United States
will have over 30,000 drones. Nowadays, drones, also known as unmanned aerial vehicles …

A comprehensive attack flow model and security analysis for Wi-Fi and WPA3

CP Kohlios, T Hayajneh - Electronics, 2018 - mdpi.com
The presence of wireless communication grows undeniably more prevalent each year.
Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks …

Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier

M Usha, P Kavitha - Wireless Networks, 2017 - Springer
Abstract The Wireless Fidelity (WiFi) is a widely used wireless technology due to its flexibility
and mobility in the presence of vulnerable security features. Several attempts to secure …

An online sequential extreme learning machine approach to WiFi based indoor positioning

H Zou, H Jiang, X Lu, L Xie - … IEEE World Forum on Internet of …, 2014 - ieeexplore.ieee.org
Developing Indoor Positioning System (IPS) has become an attractive research topic due to
the increasing demands on Location Based Service (LBS) in indoor environment recently …

[PDF][PDF] Wireless LAN security threats & vulnerabilities

M Waliullah, D Gan - International Journal of Advanced Computer Science …, 2014 - Citeseer
Wireless LANs are everywhere these days from home to large enterprise corporate networks
due to the ease of installation, employee convenience, avoiding wiring cost and constant …

An Adaptive Threat Defence Mechanism Through Self Defending Network to Prevent Hijacking in WiFi Network

DSM Narayana, SB Nookala, S Chopra… - … on Advances in …, 2023 - ieeexplore.ieee.org
IEEE 802.11 generally known as the Wi-Fi network, is our backbone of the present
communication system delivering the best effort service to the end users. Access control in …

System and method for wireless network management

MD Woxland, J Davis - US Patent 9,900,162, 2018 - Google Patents
A method includes receiving, at an access point of a network, a first message from a wireless
device. The method further includes determining a device type of the wireless device. In …

Advanced stealth man-in-the-middle attack in WPA2 encrypted Wi-Fi networks

M Agarwal, S Biswas, S Nandi - IEEE communications letters, 2015 - ieeexplore.ieee.org
The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast
frames encrypted with group transient key in the Wi-Fi Protected Access II (WPA2) enabled …

[PDF][PDF] An experimental study analysis of security attacks at IEEE 802.11 wireless local area network

M Waliullah, ABM Moniruzzaman… - International Journal of …, 2015 - academia.edu
IEEE802. 11 wireless networks have become one of the most widely used networks. Due to
open nature of wireless medium, hackers and intruders can make utilization of the loopholes …