共 50 条
- [1] Mitigating Evil Twin Attacks in 802.11 [J]. 2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 513 - 516
- [2] Measures to Abate Evil Twin Attacks in 802.11 [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 178 - 184
- [3] Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (10): : 2465 - 2473
- [5] Evil Twin Attack Mitigation Techniques in 802.11 Networks [J]. International Journal of Advanced Computer Science and Applications, 2021, 12 (06): : 38 - 41
- [6] Privacy Attacks and Defenses for Digital Twin Migrations in Vehicular Metaverses [J]. IEEE NETWORK, 2023, 37 (06): : 82 - 91
- [9] A Passive Client-based Approach to Detect Evil Twin Attacks [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 233 - 239
- [10] CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 238 - 246