Author:
Gupta Aman,Desai Aishwarya Ulhas,Sahai Ankita
Publisher
Springer International Publishing
Reference13 articles.
1. Mortensen, C., Winkelmaier, R., Zheng, J.: Exploring attack vectors facilitated by miniaturized computers. In: Proceedings of the 6th International Conference on Security of Information and Networks, pp. 203–209. ACM (2013)
2. Vemi, S.G., Panchev, C.: Vulnerability testing of wireless access points using unmanned aerial vehicles (uav). In: European Conference on e-Learning (2015)
3. Puangpronpitag, S., Sriwiboon, N.: Simple and lightweight HTTPS enforcement to protect against SSL striping attack. In: 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pp. 229–234. IEEE (2012)
4. Agarwal, M., Biswas, S., Nandi, S.: Advanced stealth man-in-the-middle attack in WPA2 encrypted wi-fi networks. IEEE Commun. Lett. 19(4), 581–584 (2015)
5. Vilius, K., Liu, L., Panneerselvam, J., Stimpson, T.: A critical analysis of the efficiencies of emerging wireless security standards against network attacks (2015)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Embedded Device Forensics with a Case Study of Raspberry Pi;2023 International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security (iQ-CCHESS);2023-09-15
2. DEC‐LADE: Dual elliptic curve‐based lightweight authentication and data encryption scheme for resource constrained smart devices;IET Wireless Sensor Systems;2021-02-14