On the use of open-source firewalls in ICS/SCADA systems

J Nivethan, M Papa - Information Security Journal: A Global …, 2016 - Taylor & Francis
Firewalls are one of the most widely used security devices to protect a communications
network. They help secure it by blocking unwanted traffic from entering or leaving the …

METDS-A self-contained, context-based detection system for evil twin access points

C Szongott, M Brenner, M Smith - … Conference, FC 2015, San Juan, Puerto …, 2015 - Springer
Abstract Mobile Evil Twin attacks stem from the missing authentication of open WiFi access
points. Attackers can trick users into connecting to their malicious networks and thereby gain …

Mitigating evil twin attacks in wireless 802.11 networks at jordan

SA Noman, M Qasaimeh, R Al-Qassas… - … Journal of Computer …, 2017 - search.proquest.com
Abstract Thinking twice before connecting to a public Wi-Fi at a coffee shop, hotel or an
airport lounge is a must nowadays. Every Wi-Fi user should be cautious whether this free Wi …

Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach

LR Horne - 2018 - nsuworks.nova.edu
Users and providers benefit considerably from public Wi-Fi hotspots. Users receive wireless
Internet access and providers draw new prospective customers. While users are able to …

[PDF][PDF] Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht vertrauenswürdigen Netzwerken

C Szongott - 2015 - repo.uni-hannover.de
Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht vertrauenswürdigen
Netzwerken Page 1 Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht …