Biometric-based human recognition systems: an overview

D Palma, PL Montessoro - Recent Advances in Biometrics, 2022 - books.google.com
With the proliferation of automated systems for reliable and highly secure human
authentication and identification, the importance of technological solutions in biometrics is …

Security of unmanned aerial vehicle systems against cyber-physical attacks

C Rani, H Modares, R Sriram… - The Journal of …, 2016 - journals.sagepub.com
The federal aviation administration has estimated that by the year 2020, the United States
will have over 30,000 drones. Nowadays, drones, also known as unmanned aerial vehicles …

A comprehensive attack flow model and security analysis for Wi-Fi and WPA3

CP Kohlios, T Hayajneh - Electronics, 2018 - mdpi.com
The presence of wireless communication grows undeniably more prevalent each year.
Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks …

Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier

M Usha, P Kavitha - Wireless Networks, 2017 - Springer
Abstract The Wireless Fidelity (WiFi) is a widely used wireless technology due to its flexibility
and mobility in the presence of vulnerable security features. Several attempts to secure …

[PDF][PDF] Wireless LAN security threats & vulnerabilities

M Waliullah, D Gan - International Journal of Advanced Computer Science …, 2014 - Citeseer
Wireless LANs are everywhere these days from home to large enterprise corporate networks
due to the ease of installation, employee convenience, avoiding wiring cost and constant …

An Adaptive Threat Defence Mechanism Through Self Defending Network to Prevent Hijacking in WiFi Network

DSM Narayana, SB Nookala, S Chopra… - … on Advances in …, 2023 - ieeexplore.ieee.org
IEEE 802.11 generally known as the Wi-Fi network, is our backbone of the present
communication system delivering the best effort service to the end users. Access control in …

System and method for wireless network management

MD Woxland, J Davis - US Patent 9,900,162, 2018 - Google Patents
A method includes receiving, at an access point of a network, a first message from a wireless
device. The method further includes determining a device type of the wireless device. In …

Advanced stealth man-in-the-middle attack in WPA2 encrypted Wi-Fi networks

M Agarwal, S Biswas, S Nandi - IEEE communications letters, 2015 - ieeexplore.ieee.org
The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast
frames encrypted with group transient key in the Wi-Fi Protected Access II (WPA2) enabled …

Wireless security auditing: attack vectors and mitigation strategies

AK Mohan, M Sethumadhavan - Procedia Computer Science, 2017 - Elsevier
Wireless security is concise on protecting the resources connected to the wireless network
from unauthorized access. Wi-Fi Protected Access II (WPA2) is a predominant variety of …