Biometric-based human recognition systems: an overview
D Palma, PL Montessoro - Recent Advances in Biometrics, 2022 - books.google.com
With the proliferation of automated systems for reliable and highly secure human
authentication and identification, the importance of technological solutions in biometrics is …
authentication and identification, the importance of technological solutions in biometrics is …
Security of unmanned aerial vehicle systems against cyber-physical attacks
The federal aviation administration has estimated that by the year 2020, the United States
will have over 30,000 drones. Nowadays, drones, also known as unmanned aerial vehicles …
will have over 30,000 drones. Nowadays, drones, also known as unmanned aerial vehicles …
A comprehensive attack flow model and security analysis for Wi-Fi and WPA3
CP Kohlios, T Hayajneh - Electronics, 2018 - mdpi.com
The presence of wireless communication grows undeniably more prevalent each year.
Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks …
Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks …
Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier
Abstract The Wireless Fidelity (WiFi) is a widely used wireless technology due to its flexibility
and mobility in the presence of vulnerable security features. Several attempts to secure …
and mobility in the presence of vulnerable security features. Several attempts to secure …
An online sequential extreme learning machine approach to WiFi based indoor positioning
Developing Indoor Positioning System (IPS) has become an attractive research topic due to
the increasing demands on Location Based Service (LBS) in indoor environment recently …
the increasing demands on Location Based Service (LBS) in indoor environment recently …
[PDF][PDF] Wireless LAN security threats & vulnerabilities
M Waliullah, D Gan - International Journal of Advanced Computer Science …, 2014 - Citeseer
Wireless LANs are everywhere these days from home to large enterprise corporate networks
due to the ease of installation, employee convenience, avoiding wiring cost and constant …
due to the ease of installation, employee convenience, avoiding wiring cost and constant …
An Adaptive Threat Defence Mechanism Through Self Defending Network to Prevent Hijacking in WiFi Network
DSM Narayana, SB Nookala, S Chopra… - … on Advances in …, 2023 - ieeexplore.ieee.org
IEEE 802.11 generally known as the Wi-Fi network, is our backbone of the present
communication system delivering the best effort service to the end users. Access control in …
communication system delivering the best effort service to the end users. Access control in …
System and method for wireless network management
MD Woxland, J Davis - US Patent 9,900,162, 2018 - Google Patents
A method includes receiving, at an access point of a network, a first message from a wireless
device. The method further includes determining a device type of the wireless device. In …
device. The method further includes determining a device type of the wireless device. In …
Advanced stealth man-in-the-middle attack in WPA2 encrypted Wi-Fi networks
The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast
frames encrypted with group transient key in the Wi-Fi Protected Access II (WPA2) enabled …
frames encrypted with group transient key in the Wi-Fi Protected Access II (WPA2) enabled …
[PDF][PDF] An experimental study analysis of security attacks at IEEE 802.11 wireless local area network
M Waliullah, ABM Moniruzzaman… - International Journal of …, 2015 - academia.edu
IEEE802. 11 wireless networks have become one of the most widely used networks. Due to
open nature of wireless medium, hackers and intruders can make utilization of the loopholes …
open nature of wireless medium, hackers and intruders can make utilization of the loopholes …