Author:
Chang TienHo,Chen Chiamei,Hsiao Hanwei,Lai GuHsin
Reference19 articles.
1. Kim, N.Y., Shim, J., Cho, S.J., Park, M., Han, S.: Android application protection against static reverse engineering based on multidexing. J. Internet Serv. Inf. Secur. (JISIS) 6(4), 54–64 (2016)
2. Skovoroda, A., Gamayunov, D.: Securing mobile devices: malware mitigation methods. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. (JoWUA) 6(2), 78–97 (2015)
3. General Stats Homepage.
https://wigle.net/gps/gps/main/stats/
. Last accessed 30 April 2016
4. Fatani, H.A., Zamzami, I.F., Aliyu, M.: Awareness toward wireless security policy: case study of International Islamic University Malaysia. In: Proceedings of the 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), pp. 1–5. IEEE, Morocco (2013)
5. Krekan, J., Pleva, M., Dobos, L.: Statistical models based password candidates generation for specified language used in wireless LAN security audit. In: Proceedings of the 20th International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 95–98. IEEE, Romania (2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mobile crowd computing: potential, architecture, requirements, challenges, and applications;The Journal of Supercomputing;2023-07-29
2. Wireless Encryption and WPA2 Weaknesses;2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC);2021-01-27