Stalking the stalkers–detecting and deterring stalking behaviours using technology: A review

B Eterovic-Soric, KKR Choo, H Ashman, S Mubarak - Computers & security, 2017 - Elsevier
The Internet age has brought with it a slew of tools and research which allow stalkers, from
ex-lovers to complete strangers, to follow a person's life in great detail without their consent …

A systematic review of Wi-Fi and machine learning integration with topic modeling techniques

D Atzeni, D Bacciu, D Mazzei, G Prencipe - Sensors, 2022 - mdpi.com
Wireless networks have drastically influenced our lifestyle, changing our workplaces and
society. Among the variety of wireless technology, Wi-Fi surely plays a leading role …

Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms

M Vanhoef, C Matte, M Cunche, LS Cardoso… - Proceedings of the 11th …, 2016 - dl.acm.org
We present several novel techniques to track (unassociated) mobile devices by abusing
features of the Wi-Fi standard. This shows that using random MAC addresses, on its own …

Evaluating physical-layer ble location tracking attacks on mobile devices

H Givehchian, N Bhaskar, ER Herrera… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Mobile devices increasingly function as wireless tracking beacons. Using the Bluetooth Low
Energy (BLE) protocol, mobile devices such as smartphones and smartwatches …

Non-cooperative wi-fi localization & its privacy implications

A Abedi, D Vasisht - Proceedings of the 28th Annual International …, 2022 - dl.acm.org
We present Wi-Peep-a new location-revealing privacy attack on non-cooperative Wi-Fi
devices. Wi-Peep exploits loopholes in the 802.11 protocol to elicit responses from Wi-Fi …

Defeating MAC address randomization through timing attacks

C Matte, M Cunche, F Rousseau… - Proceedings of the 9th …, 2016 - dl.acm.org
MAC address randomization is a common privacy protection measure deployed in major
operating systems today. It is used to prevent user-tracking with probe requests that are …

Fragment and forge: breaking {Wi-Fi} through frame aggregation and fragmentation

M Vanhoef - 30th USENIX security symposium (USENIX Security 21 …, 2021 - usenix.org
In this paper, we present three design flaws in the 802.11 standard that underpins Wi-Fi.
One design flaw is in the frame aggregation functionality, and another two are in the frame …

A case study of WiFi sniffing performance evaluation

Y Li, J Barthelemy, S Sun, P Perez, B Moran - IEEE Access, 2020 - ieeexplore.ieee.org
Mobile devices regularly broadcast WiFi probe requests in order to discover available
proximal WiFi access points for connection. A probe request, sent automatically in the active …

Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests

A Di Luzio, A Mei, J Stefa - IEEE INFOCOM 2016-The 35th …, 2016 - ieeexplore.ieee.org
Whenever our smartphones have their WiFi radio interface on, they periodically try to
connect to known wireless APs (networks the user has connected to in the past). This is …

Accurate occupancy estimation with WiFi and bluetooth/BLE packet capture

E Longo, AEC Redondi, M Cesana - Computer Networks, 2019 - Elsevier
The capillary spread of personal devices equipped with wireless communication capabilities
has enabled a series of high level services which build on capturing and processing the …