Communication infrastructures and the contest over location positioning

R Wilken - Mobile Media & Communication, 2019 - journals.sagepub.com
… As noted earlier, the sending of probe requests works because 802.1 Wi-Fi standards are …
WiFi-enabled devices to monitor WiFi access points in a target area to indicate whether a WiFi

Elixir: Efficient data transfer in WiFi-based IoT nodes

D Jaisinghani, G Singh, H Fulara, M Maity… - Proceedings of the 24th …, 2018 - dl.acm.org
WiFi deployment with multiple APs and IoT nodes. We leverage the probe requests and the
probe … Figure 4: System Architecture of Elixir our modification have minimal footprint. We …

Cloudy with a chance of short RTTs: analyzing cloud connectivity in the internet

TK Dang, N Mohan, L Corneo, A Zavodovski… - Proceedings of the 21st …, 2021 - dl.acm.org
… (3) As the Speedchecker probes use WiFi or cellular connections to access the Internet,
we also isolate the impact of a wireless last-mile on overall cloud access latency (§5). We find …

Multiple-perspective clustering of passive Wi-Fi sensing trajectory data

Z Koh, Y Zhou, BPL Lau, C Yuen… - … Transactions on Big …, 2020 - ieeexplore.ieee.org
… Malik, and CE Kontokosta, “Digital footprints: Using WiFi probe and locational data to ana…
Liu, “BaG: Behavior-aware group detection in crowded urban spaces using WiFi probes,” IEEE …

Attack detection for wireless enterprise network: a machine learning approach

Y Qin, B Li, M Yang, Z Yan - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
… In addition, there is now a public dataset called Aegean WiFi … This attack causes a dramatic
growth in the probe response … data for passive attacks as they have no digital footprints [5]. …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
probing, on the other hand, injects traffic or initiates an action in order to collect a response
and observe its effect. Active probing … source followed by active probing of another data type …

WIDS: An anomaly based intrusion detection system for Wi-Fi (IEEE 802.11) protocol

P Satam, S Hariri - IEEE Transactions on Network and Service …, 2020 - ieeexplore.ieee.org
… sending out Management frames of type Probe requests. All listening APs respond to probe
requests with Management frames of type Probe response if their configurations allow these …

Contextualizing human dynamics: Understanding the semantics of movement trajectories with Wi-Fi data

L Li, X Chen, Q Li, X Tan, J Chen, D Wang… - Travel Behaviour and …, 2021 - Elsevier
… the form of Wi-Fi probe requests—when a smart device (eg, smartphone) initiates a connection
to a Wi-Fi network, it will send out a series of probe requests with a unique media access …

Digital Storytelling for increasing Information Security Awareness among Kenyan Smartphone Users: A Case Study of Nairobi and Eldoret

LJ Kosgey - 2020 - repository.kemu.ac.ke
… Consequently, this research uses a digital storytelling information security model to
design a media that seeks to increase awareness on the use of public Wi-Fi among Kenyan …

RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi Devices

R Li, H Hu, Q Ye - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
… On the other hand, early efforts, such as [40] exploits IEEE 802.11 probe requests to adversarially
… Malik, and CE Kontokosta, “Digital footprints: Using wifi probe and locational data to …