Exploring Wi-Fi WPA2 KRACK vulnerability: A review paper

M Alhamry, W Elmedany - … on Data Analytics for Business and …, 2022 - ieeexplore.ieee.org
Wi-Fi networks are preferred by many businesses and organizations since they save money
on wiring and give staff more flexibility. organizations and people are becoming more …

Migrating data between physical server and cloud: improving accuracy and data integrity

M Alkhonaini, H El-Sayed - … On Trust, Security And Privacy In …, 2018 - ieeexplore.ieee.org
The Cloud (Cloud Computing) has been the center of attraction for both businesses and
organizations. As the organizations make the ultimate decision of embracing the technology …

[PDF][PDF] Analyse Security of the Disassociation Procedure in the IEEE 802.15. 4 Standard

AA ALABDULATIF - International Journal of Computer Science and …, 2020 - osf.io
The IEEE 802.15. 4 standard is used in networks that entail wireless technology within short
distances and low traffic of exchange messages. This type of network is an approach of the …

Security Attacks in IEEE 802.15. 4: A Review Disassociation Procedure

AA Alabdulatif - Emerging Trends in Intelligent Computing and …, 2020 - Springer
The specification of Physical layer PHY and MAC layer for Low Rate Wireless Personal Area
network (LR-WPAN) is provided in the IEEE 802.15. 4 standard. This standard offers four …

[PDF][PDF] Efficient security protocols for fast handovers in wireless mesh networks

CJ Li - 2015 - yorkspace.library.yorku.ca
Wireless mesh networks (WMNs) are gaining popularity as a flexible and inexpensive
replacement for Ethernet-based infrastructures. As the use of mobile devices such as smart …