Author:
Thankappan Manesh,Rifà-Pous Helena,Garrigues Carles
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference70 articles.
1. Abare, G., & Garba, E. J. (2019). A Proposed Model for Enhanced Security against Key Reinstallation Attack on Wireless Networks. 3, 21–27.
2. Rogue access point detection: Taxonomy, challenges, and future directions;Alotaibi;Wireless Personal Communications,2016
3. Louca, C., Peratikou, A., & Stavrou, S. (2021). 802.11 Man-in-the-Middle Attack Using Channel Switch Announcement. Springer International Publishing. doi: 10.1007/978-3-030-64758-2.
4. Physical unclonable functions in the internet of things: State of the art and open challenges;Babaei;Sensors (Switzerland),2019
5. Beck, M., & Tews, E. (2009). Practical attacks against WEP and WPA. Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec’09, 79–85. doi: 10.1145/1514274.1514286.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献