Author:
Asaduzzaman Md.,Majib Mohammad Shahjahan,Rahman Md. Mahbubur
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Theoretical and Practical Aspects of the Evil Twin Attack. The Attacker’s Perspective and Defense Methodology;Communications in Computer and Information Science;2024
2. Feature Selection in Wireless Intrusion Detection System for Evil Twin Attack Detection;2023 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT);2023-09-08
3. A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load;2023 IEEE 13th International Conference on Consumer Electronics - Berlin (ICCE-Berlin);2023-09-03
4. Near-Source Attack for Isolated Networks with Covert Channel Transmission;2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud)/2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (EdgeCom);2023-07
5. An Adversarial Approach for Intrusion Detection Using Hybrid Deep Learning Model;2022 International Conference on Information Technology Research and Innovation (ICITRI);2022-11-10