-
1
Merencanakan Keamanan Jaringan Komputer
Published 2011-06-01Subjects: “…wireless, security, network, connection…”
Get full text
Article -
2
SECURITY IN THE ERA OF MOBILE WIRELESS ENTERPRISES
Published 2014-02-01Subjects: “…wireless security…”
Get full text
Article -
3
-
4
Overview of Romania 802.11Wireless Security & Statistics
Published 2017-12-01Subjects: “…wireless security…”
Get full text
Article -
5
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
Published 2018-01-01Subjects: Get full text
Article -
6
PROPOSED SYSTEM FOR WIRELESS SECURITY
Published 2010-12-01Subjects: “…Wireless Security…”
Get full text
Article -
7
Key-Indexed Channel Phase Extended Permutation for Secure Physical Layer Authentication in Correlated Sub-Channels
Published 2024-01-01Subjects: Get full text
Article -
8
A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels
Published 2020-01-01Subjects: Get full text
Article -
9
Wireless Security Protocols WPA3: A Systematic Literature Review
Published 2023-01-01Subjects: “…Wireless security protocol…”
Get full text
Article -
10
A Review of Hash Function Types and their Applications
Published 2022-09-01Subjects: Get full text
Article -
11
Physical Layer Authentication Enhancement Using a Gaussian Mixture Model
Published 2018-01-01Subjects: Get full text
Article -
12
Attacks and Defenses in Short-Range Wireless Technologies for IoT
Published 2020-01-01Subjects: Get full text
Article -
13
Obscuring Transaction Information in Decentralized P2P Wireless Networks
Published 2023-01-01Subjects: Get full text
Article -
14
Increasing Students Awareness of Mobile Privacy and Security Using Modules
Published 2019-08-01Subjects: Get full text
Article -
15
Revisiting Adaptive Frequency Hopping Map Prediction in Bluetooth with Machine Learning Classifiers
Published 2021-02-01Subjects: Get full text
Article -
16
Rethinking Tag Collisions for Replay and Relay Attack Resistance in Backscatter Networks
Published 2023-01-01Subjects: Get full text
Article -
17
Stealthy Adversarial Attacks on Machine Learning-Based Classifiers of Wireless Signals
Published 2024-01-01Subjects: Get full text
Article -
18
End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks
Published 2019-01-01Subjects: Get full text
Article -
19
Fog computing security: a review of current applications and security solutions
Published 2017-08-01Subjects: Get full text
Article -
20
A Radio Frequency Fingerprinting-Based Aircraft Identification Method Using ADS-B Transmissions
Published 2024-03-01Subjects: Get full text
Article