-
1Academic Journal
مصطلحات موضوعية: Wi-Fi security technology, 802.11 standard, WEP, WPA, WPA2, WPA3, encryption protocols, Wi-Fi networks
Relation: https://zenodo.org/communities/sai_2181-3337; https://doi.org/10.5281/zenodo.7856630; https://doi.org/10.5281/zenodo.7856631; oai:zenodo.org:7856631
-
2Academic Journal
المؤلفون: Krzysztof Uszko, Maciej Kasprzyk, Marek Natkaniec, Piotr Chołda
المصدر: Electronics; Volume 12; Issue 11; Pages: 2355
مصطلحات موضوعية: 5G Wi-Fi security, MAC layer threats, network traffic analysis, threat detection, machine learning
وصف الملف: application/pdf
Relation: Computer Science & Engineering; https://dx.doi.org/10.3390/electronics12112355
-
3Academic Journal
المؤلفون: Adrian Carballal, J. Pablo Galego-Carro, Nereida Rodriguez-Fernandez, Carlos Fernandez-Lozano
المصدر: PeerJ Computer Science, Vol 8, p e1185 (2022)
مصطلحات موضوعية: WPA/WPA2, Wi-Fi security, Password cracking, Hashcat, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
4Conference
المؤلفون: Freudenreich, Jan, Weidman, Jake, Grossklags, Jens
المساهمون: Technische Universität Munchen - Technical University Munich - Université Technique de Munich (TUM), Pennsylvania State University (Penn State), Penn State System, Nathan Clarke, Steven Furnell, TC 11, WG 11.12
المصدر: IFIP Advances in Information and Communication Technology ; 14th International Symposium on Human Aspects of Information Security and Assurance (HAISA) ; https://inria.hal.science/hal-03657727 ; 14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.233-243, ⟨10.1007/978-3-030-57404-8_18⟩
مصطلحات موضوعية: WPA/Wi-Fi security, KRACK attack, Interview study, [INFO]Computer Science [cs]
Relation: hal-03657727; https://inria.hal.science/hal-03657727; https://inria.hal.science/hal-03657727/document; https://inria.hal.science/hal-03657727/file/497442_1_En_18_Chapter.pdf
-
5Academic Journal
المؤلفون: Byoungcheon Lee
المصدر: Electronics; Volume 10; Issue 2; Pages: 215
مصطلحات موضوعية: Wi-Fi security, WPA3, PMK caching, paired token, secondary credential, JSON web token, one-time authenticated key establishment, stateless re-association
وصف الملف: application/pdf
Relation: Microwave and Wireless Communications; https://dx.doi.org/10.3390/electronics10020215
-
6Dissertation/ Thesis
المؤلفون: Abbas, Mazhar
مصطلحات موضوعية: Smart home security, IoT security, AWS IoT, MQTT, data transmission, network security, ARP spoofing, Wi-Fi security, Denial-of-Service attack, network segmentation, encryption, MQTT proxy, Electrical Engineering, Electronic Engineering, Information Engineering, Elektroteknik och elektronik
وصف الملف: application/pdf
-
7Academic Journal
المؤلفون: Hai-yan KANG, Han YAN, Hao-ran HUANG, Xuan1 SUN
المصدر: Tongxin xuebao, Vol 37, Pp 50-56 (2016)
مصطلحات موضوعية: Wi-Fi, intelligent protection shield, Android, Wi-Fi security evaluation, Telecommunication, TK5101-6720
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
8
-
9Report
المؤلفون: Sombatruang, N, Kadobayashi, Y, Sasse, MA, Baddeley, M, Miyamoto, D
المصدر: In: 2018 16th Annual Conference on Privacy, Security and Trust (PST) proceedings. IEEE: Belfast, UK. (2018)
مصطلحات موضوعية: Public Wi-Fi Security, Human-Centered Security, Users Decision-Making, Resource Preservation Heuristic
وصف الملف: text
Relation: https://discovery.ucl.ac.uk/id/eprint/10074787/1/Wi_Fi_Japan_CFP_Final_accepted_names.pdf; https://discovery.ucl.ac.uk/id/eprint/10074787/
-
10
المؤلفون: Beboso, Kevin
مصطلحات موضوعية: Brut Force Angriff, Dictionary Attack, Key-Recovery, Brut Force Attack, Dragonfly Handshake, Wi-Fi Security, Aircrack-ng, Man-in-the-Middle, Drahtlose Sicherheit, WPA2, Traffic Decryption, Wi-Fi Angriffe, KRACK, Dictionary Angriff, WPA3, Dragonblood, WLAN, Wi-Fi Vulnerabilities, Wi-Fi Attacks, WPA, Wireless Security, WEP, Wi-Fi, Evil Twin, Wi-Fi Sicherheitslücken
وصف الملف: kein Volltext verfügbar
-
11
المؤلفون: Ilhan Firat Kilincer, Abdulkadir Sengur, Orhan Yaman, Fatih Ertam
المصدر: Volume: 4, Issue: 2 65-76
Acta Infologicaمصطلحات موضوعية: Computer Science, Information System, IoT,IEEE 802.1x,DMZ,SSL-VPN,Kablosuz Sensör Ağları,Ağ Güvenliği,Wi-Fi Güvenliği, business.industry, DMZ, Computer science, Bilgisayar Bilimleri, Bilgi Sistemleri, General Medicine, Internet of Things, business, Humanities, IoT,IEEE 802.1x,DMZ,SSL-VPN,Wireless Sensor Networks,Network Security,Wi-Fi Security
وصف الملف: application/pdf
-
12Academic Journal
المؤلفون: Soon-Tai Park, Haeryong Park, Myoung-sun Noh, Yoo-Jae Won
مصطلحات موضوعية: Wireless LAN Security, Wi-Fi Security, Wireless Access Point, Product Life-Cycle
Relation: https://zenodo.org/communities/waset; https://doi.org/10.5281/zenodo.1075131; https://doi.org/10.5281/zenodo.1075132; oai:zenodo.org:1075132
-
13Dissertation/ Thesis
المؤلفون: Plieschnegger, Stefanie
المساهمون: Weippl, Edgar, TU Wien, Österreich, Dabrowski, Adrian
مصطلحات موضوعية: Wi-Fi Sicherheit, Feldstudie, Wi-Fi security, fieldstudy
وصف الملف: xi, 102 Seiten
Relation: https://doi.org/10.34726/hss.2018.46600; http://hdl.handle.net/20.500.12708/7945; AC15222568; urn:nbn:at:at-ubtuw:1-119127
-
14Academic Journal
المؤلفون: Boretskyy, Taras
المساهمون: Lviv Polytechnic National University
مصطلحات موضوعية: Wi-Fi security, WPA2-PSK, dictionary attack, hacking, 4-way handshake, PBKDF2 authentication protocol
جغرافية الموضوع: Львів
وصف الملف: 1-6; application/pdf; image/png
Relation: Advances in Cyber-Physical Systems : scientific journal, 1 (4), 2019; http://www.aircrack-ng.org/; http://csrc.nist.gov/; http://www.haveibeenpwned.com/; http://www.3wifi.stascorp.com/; 1. S. Fluhrer, I. Mantin, and A. Shamir. “Weaknesses in the key scheduling algorithm of RC4”, International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.; 2. M. Vanhoef and E. Ronen. “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”, p. 1–16.; 3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018].; 4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.; 5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]; 6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.; 7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018].; 8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018].; 1. S. Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the key scheduling algorithm of RC4", International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.; 2. M. Vanhoef and E. Ronen. "Dragonblood: A Security Analysis of WPA3’s SAE Handshake", p. 1–16.; Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.; https://ena.lpnu.ua/handle/ntb/45644; Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.
الاتاحة: https://ena.lpnu.ua/handle/ntb/45644
-
15
المؤلفون: Galego Carro, José Pablo
المساهمون: Carballal, Adrián, Fernández-Lozano, Carlos, Enxeñaría informática, Grao en
المصدر: RUC. Repositorio da Universidade da Coruña
instnameمصطلحات موضوعية: Seguridad Wi-Fi, Hashcat, Password cracking, Cracking de contraseñas, WPA/WPA2, Wi-Fi security, WEP
-
16
المؤلفون: Youki Kadobayashi, Nissy Sombatruang, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto
المساهمون: Sombatruang, Nissy, Kadobayashi, Youki, Sasse, M Angela, Baddeley, Michelle, Miyamoto, Daisuke, 16th Annual Conference on Privacy, Security and Trust (PST) Belfast, North Ireland 28-30 August 2018
المصدر: PST
مصطلحات موضوعية: Downtown, business.industry, Mobile broadband, 05 social sciences, Internet privacy, Allowance (money), 020206 networking & telecommunications, uusers decision-making, 02 engineering and technology, Encryption, Login, Electronic mail, resource preservation heuristic, human-centered security, 0202 electrical engineering, electronic engineering, information engineering, 0501 psychology and cognitive sciences, The Internet, business, Mobile device, 050107 human factors, public Wi-Fi security
-
17Academic Journal
المؤلفون: Nakhila, Omar, Amjad, Muhammad Faisal, Dondyk, Erich, Zou, Cliff
المصدر: Scopus Export 2015-2019
مصطلحات موضوعية: Evil Twin Attack, LORCON, Open WiFiHop, Virtual wireless client, Wi-Fi security
-
18Academic JournalCircumvent Traffic Shaping Using Virtual Wireless Clients In Ieee 802.11 Wireless Local Area Network
المؤلفون: Nakhila, Omar, Zou, Cliff
المصدر: Scopus Export 2015-2019
مصطلحات موضوعية: Virtual Wireless Client, Wi-Fi hotspot, Wi-Fi Security, Wi-Fi Traffic Shaping
-
19
المؤلفون: M. Angela Sasse, Michelle Baddeley, Nissy Sombatruang
المساهمون: 6th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2016 Los Angeles, US 5 December 2016, Sombatruang, N, Sasse, MA, Baddeley, M
المصدر: STAST
مصطلحات موضوعية: Risk awareness, Risk behaviour, business.industry, 05 social sciences, Internet privacy, public wi-fi security, data leakage, 0502 economics and business, Sexual orientation, people and security, 0501 psychology and cognitive sciences, Instant messaging, 050207 economics, Date of birth, business, Set (psychology), 050107 human factors, Expected utility hypothesis, Behavioural economics
-
20Academic Journal
المؤلفون: Nakhila, Omar, Zou, Cliff
المصدر: Scopus Export 2015-2019
مصطلحات موضوعية: Brute force attack, Virtual wireless clients, Wi-Fi security, WPA-II enterprise