CheckShake: Passively detecting anomaly in Wi-Fi security handshake using gradient boosting based ensemble learning
A Agrawal, U Chatterjee… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, a number of attacks have been demonstrated (like key reinstallation attack, called
KRACK) on WPA2 protocol suite in Wi-Fi WLAN, for which a patching is often challenging. In …
KRACK) on WPA2 protocol suite in Wi-Fi WLAN, for which a patching is often challenging. In …
Detection of wireless fake access points
N Lovinger, T Gerlich, Z Martinasek… - 2020 12th International …, 2020 - ieeexplore.ieee.org
Wireless networks have become a common part of everyone's life who wants to connect to
the Internet network. Despite the rapid development of wireless technologies, common users …
the Internet network. Despite the rapid development of wireless technologies, common users …
TinyAP: An Intelligent Access Point to Combat Wi-Fi Attacks Using TinyML
A Agrawal, RR Maiti - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
In the recent past, there has been a significant surge in MAC layer Wi-Fi attacks, leaving
Wireless Local Area Networks (WLANs) vulnerable to different types of network intrusion …
Wireless Local Area Networks (WLANs) vulnerable to different types of network intrusion …
Design of A Novel Model that Aids Task Estimation in Comparison with a Regression Tree
One of the sectors with the fastest recent growth is the software sector. Project management
is key to the software industry's success. One of the most crucial tasks in software project …
is key to the software industry's success. One of the most crucial tasks in software project …
Blockchain-based implementation on electronic know your customer (e-KYC)
KS Chandraprabha - Intelligent Communication Technologies and Virtual …, 2023 - Springer
Abstract The electronic Know Your Customer (e-KYC) is basically a system for all the
banking enterprises or for the identity providers to establish and provide a customer identity …
banking enterprises or for the identity providers to establish and provide a customer identity …
Bug Predictive Models based on Data Analytics and Soft Computing Techniques: A Survey
As software projects become larger and more complex, bugs pose a significant threat to their
consistency and efficiency. During early phases of software development, bug prediction …
consistency and efficiency. During early phases of software development, bug prediction …
Cryptography using gpgpu
Today, with an ever-increasing number of computer users, the number of cyberattacks to
steal data and invade privacy is of utmost importance. A group of applications uses the …
steal data and invade privacy is of utmost importance. A group of applications uses the …
Machine learning–based approach for detecting beacon forgeries in wi-fi networks
R Jaysankar, VS Mohan… - Artificial Intelligence and …, 2023 - taylorfrancis.com
Wi-Fi networks have evolved rapidly, resulting in improved performance through increased
datarates. In these networks, access points periodically broadcast beacon frames for …
datarates. In these networks, access points periodically broadcast beacon frames for …
Wireless lan intrusion detection and prevention system for malicious access point
SB Vanjale, PB Mane, SV Patil - 2015 2nd International …, 2015 - ieeexplore.ieee.org
In current trends, A Malicious AP might be set in any open spaces so as to imitate honest to
goodness APs for adaptation. Existing malicious AP detection methods analyze wireless …
goodness APs for adaptation. Existing malicious AP detection methods analyze wireless …
Sequence-based indoor localization with channel status information
Z Wang, Y Chen, H Wang - Sensors, 2018 - mdpi.com
Most of the indoor localization systems nowadays are based on received signal strength
indication (RSSI), which has further increased the importance of precise localization of …
indication (RSSI), which has further increased the importance of precise localization of …