Analysis and evaluation of wireless networks by implementation of test security keys

A Rahman, M Ali - … in Computing: First International Conference, iCETiC …, 2018 - Springer
There are so many weaknesses found in the Wired Equivalent Privacy (WEP) key usage
protocol and even in the improved Wireless Protected Access (WPA) security key generation …

Wi-Fi enabled personal computer network monitoring system using smart phone with enhanced security measures

A Arora, A Khera - Procedia Computer Science, 2015 - Elsevier
Abstract In today's Scenario, Remote Monitoring is a fascinating research aspect of mobile
computing technology. In this research paper, our prime focus is on the Personal computer …

Assessment of open source tools and techniques for network security

U Guru Prasad, R Girija, R Vedhapriyavadhana… - Cyber Security and …, 2022 - Springer
Providing network security with an open source has been a huge concern today. Data
transmitted over the network shall not be assumed to be stable. There are numerous attacks …

Thread kotiautomaatiossa

JHT Parkkila - 2024 - jyx.jyu.fi
IoT: n nopean yleistymisen myötä yhä useammassa kodissa hyödynnetään tänä päivänä
kotiautomaatiota. Kotiautomaatiolla pyritään yleensä helpottamaan asumista, optimoimaan …

An Authenticated Routing Protocol for Wireless Ad Hoc Network Based on Small World Model

D Wang, L Xu - International Journal of Electronics and …, 2021 - ijet.pl
Compared with traditional cellular networks, wireless ad hoc networks do not have trusted
entities such as routers, since every node in the network is expected to participate in the …

[PDF][PDF] Electronic methods for obtaining IP addresses through webmail and social networks

GVM Sánchez, EVÁ Yuque, VH Benitez - researchgate.net
Obtaining data is a fundamental stage in a computer security process both to identify
violators or to detect vulnerabilities in a certain system. For tasks such as investigation or …

Métodos electrónicos para obtención de direcciones IP a través de webmail y redes sociales

GVM Sánchez, EVÁ Yuque, VHB Bravo… - …, 2020 - cienciadigital.org
La obtención de datos es una etapa fundamental en un proceso de seguridad informática
tanto para identificar infractores o para detectar vulnerabilidades en un determinado …

Fundamentos prácticos de seguridad en redes inalámbricas ieee 802.11

OP Sarmiento, FG Guerrero… - Ingeniería e …, 2008 - repositorio.unal.edu.co
Este artículo presenta una discusión tutorial de tres estándares de seguridad de uso común
en las redes inalámbri-cas IEEE 802.11: WEP, WPA y WPA2. Se realiza un análisis …

[PDF][PDF] WPA2 Residential

J Opio - researchgate.net
ABSTRACT Wi-Fi Protected Access version 2 (WPA2), released by Wi-Fi Alliance in 2004,
has provided a robust security solution ever since. The WPA2 protocol standard was …

[PDF][PDF] WLAN 상에서의분산가상재머공격

이현록, 김광조 - caislab.kaist.ac.kr
요 약최근 IEEE 802.11 (WiFi) 에 기반한 많은 수의 무선 인터넷 액세스 포인트 (Access Point)
가 사람들이 많이 모이는 장소인 공항, 카페, 쇼핑몰 등에 핫스팟이라는 이름으로 설치되고 …