Author:
Corbett Cherita,Beyah Raheem,Copeland John
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A passive user-side solution for evil twin access point detection at public hotspots;International Journal of Communication Systems;2020-06-25
2. Learning Remote Computer Fingerprinting;Studies in Computational Intelligence;2014
3. A Review on Wireless Network Security;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2013
4. Security in Wireless Local Area Networks;Wireless Network Security;2013
5. An 802.11 MAC layer covert channel;Wireless Communications and Mobile Computing;2010-05-07