Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the security of the automatic dependent surveillance-broadcast protocol
M Strohmeier, V Lenders… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol
currently being rolled out as part of next-generation air transportation systems. As the heart …
currently being rolled out as part of next-generation air transportation systems. As the heart …
Security in visible light communication: Novel challenges and opportunities
As LED lighting becomes increasingly ubiquitous, Visible Light Communication is attracting
the interest of academia and industry as a complement to RF as the physical layer for the …
the interest of academia and industry as a complement to RF as the physical layer for the …
Advanced Wi-Fi attacks using commodity hardware
M Vanhoef, F Piessens - Proceedings of the 30th Annual Computer …, 2014 - dl.acm.org
We show that low-layer attacks against Wi-Fi can be implemented using user-modifiable
firmware. Hence cheap off-the-shelf Wi-Fi dongles can be used carry out advanced attacks …
firmware. Hence cheap off-the-shelf Wi-Fi dongles can be used carry out advanced attacks …
On limitations of friendly jamming for confidentiality
NO Tippenhauer, L Malisa… - … IEEE symposium on …, 2013 - ieeexplore.ieee.org
Wireless communication provides unique security challenges, but also enables novel ways
to defend against attacks. In the past few years, a number of works discussed the use of …
to defend against attacks. In the past few years, a number of works discussed the use of …
Practical covert channels for WiFi systems
Wireless covert channels promise to exfiltrate information with high bandwidth by
circumventing traditional access control mechanisms. Ideally, they are only accessible by …
circumventing traditional access control mechanisms. Ideally, they are only accessible by …
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control
It is not commonly known that off-the-shelf smartphones can be converted into versatile
jammers. To understand how those jammers work and how well they perform, we …
jammers. To understand how those jammers work and how well they perform, we …
Security of ADS− B: State of the Art and Beyond
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol
currently being rolled out as part of next generation air transportation systems. As the heart …
currently being rolled out as part of next generation air transportation systems. As the heart …
On practical selective jamming of bluetooth low energy advertising
Bluetooth Low Energy (BLE) Advertising is an important component of BLE as it is used to
broadcast connection information to other devices nearby, usually smartphones …
broadcast connection information to other devices nearby, usually smartphones …
[PDF][PDF] Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Physical layer security schemes for wireless communication systems have been broadly
studied from an information theory point of view. In contrast, there is a dearth of attack …
studied from an information theory point of view. In contrast, there is a dearth of attack …
Gaining insight on friendly jamming in a real-world IEEE 802.11 network
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its
malicious aspects have received much attention in the literature. Yet, several recent works …
malicious aspects have received much attention in the literature. Yet, several recent works …