Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Howies: A holistic approach to zigbee assisted wifi energy savings in mobile devices
We propose HoWiES, a system that saves energy consumed by WiFi interfaces in mobile
devices with the assistance of ZigBee radios. The core component of HoWiES is a …
devices with the assistance of ZigBee radios. The core component of HoWiES is a …
Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes
Z Tang, Y Zhao, L Yang, S Qi, D Fang… - Mobile Information …, 2017 - Wiley Online Library
Evil‐Twin is becoming a common attack in smart home environments where an attacker can
set up a fake AP to compromise the security of the connected devices. To identify the fake …
set up a fake AP to compromise the security of the connected devices. To identify the fake …
Smartassoc: Decentralized access point selection algorithm to improve throughput
As the first step of the communication procedure in 802.11, an unwise selection of the
access point (AP) hurts one client's throughput. This performance downgrade is usually hard …
access point (AP) hurts one client's throughput. This performance downgrade is usually hard …
Online detection of fake access points using received signal strengths
Wireless access points (APs) are widely used for the convenience and productivity of
smartphone users. The growing popularity of wireless local area networks (WLANs) …
smartphone users. The growing popularity of wireless local area networks (WLANs) …
Vproof: Lightweight privacy-preserving vehicle location proofs
Transportation systems relying on vehicles to collect data for services such as road condition
monitoring are vulnerable to malicious vehicles injecting large amounts of fake data. A …
monitoring are vulnerable to malicious vehicles injecting large amounts of fake data. A …
Taxonomy and future threat of rogue access point for wireless network
Wireless network communication is an enormous and vast area of research. Many
companies and organizations, related to wireless security have struggled due to the narrow …
companies and organizations, related to wireless security have struggled due to the narrow …
VR-defender: Self-defense against vehicular rogue APs for drive-thru internet
This paper considers the problem of vehicular rogue access points (APs) for drive-thru
Internet. Vehicular rogue APs are set up in moving vehicles to mimic legitimate roadside APs …
Internet. Vehicular rogue APs are set up in moving vehicles to mimic legitimate roadside APs …
Multi parameter based robust and efficient rogue AP detection approach
Wireless LANs are an integral part of todays globalized economy. WLANs are growing and
so are their threats. The main security threat in a wireless network is a malicious or rogue …
so are their threats. The main security threat in a wireless network is a malicious or rogue …
Identifying and disabling a rogue access point in a public wireless environment
P Watson, C Lin, M Dierickx - US Patent 10,257,215, 2019 - Google Patents
Primary Examiner—Yogesh Paliwal (74) Attorney, Agent, or Firm—Brian Furrer (57)
ABSTRACT A system for identifying a wireless security threat on a vehicle. The system …
ABSTRACT A system for identifying a wireless security threat on a vehicle. The system …
Rogue access point detection in vehicular environments
H Qu, L Guo, W Zhang, J Li, M Ren - … , WASA 2015, Qufu, China, August 10 …, 2015 - Springer
The threat of rogue access points (APs) has attracted significant attentions from both
industrial and academic researchers. This paper considers a category of rogue APs that are …
industrial and academic researchers. This paper considers a category of rogue APs that are …