[HTML][HTML] Data mining for cyber biosecurity risk management–A comprehensive review

DD Shankar, AS Azhakath, N Khalil, J Sajeev… - Computers & …, 2024 - Elsevier
The world is currently facing the era of Cyberbiosecurity, also known as Biocybersecurity, or
Digital Biosecurity, which poses a few unique security vulnerabilities. A significant …

A Tutorial On Privacy, RCM and Its Implications in WLAN

D Ficara, RG Garroppo, J Henry - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
The proliferation of Wi-Fi devices has led to the rise of privacy concerns related to MAC
Address-based systems used for people tracking and localization across various …

A security assessment for consumer WiFi drones

J Gordon, V Kraj, JH Hwang… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Small-scale unmanned aerial vehicles (UAVs) have become an increased presence in
recent years due to their decreasing price and ease of use. Similarly, ways to detect drones …

Malware spreading model for routers in Wi-Fi networks

DT Le, TT Tran, KQ Dang, R Alkanhel… - IEEE Access, 2022 - ieeexplore.ieee.org
Malware attacks have become very common in recent years. The variety and continuous
improvement of malware capabilities threaten any network. Wi-Fi is also not an exception in …

Detection and mitigation of wireless link layer attacks

MAC Aung, KP Thant - 2017 IEEE 15th international conference …, 2017 - ieeexplore.ieee.org
Nowadays, Wireless Local Area Networks (WLANs) have become popular because of
mobility, lower installation, maintenance and ease of placement. The rapid growth in the …

Mac layer management frame denial of service attacks

J Kaur - 2016 International Conference on Micro-Electronics …, 2016 - ieeexplore.ieee.org
In the today era internet is very great in demand and it is become more important when
comes into wireless. Wireless LAN are more flexible and easy to use than wired LAN. So …

Detection of DoS attacks on Wi-Fi networks using IoT sensors

I Joseph, PB Honnavalli, BR Charanraj - … Advanced Computing: Select …, 2022 - Springer
IoT has become a primary target for data theft. There is a legal risk if disconnection of a user
from a network occurs frequently. Moreover, service providers would be accountable to the …

[PDF][PDF] An IEEE 802.11 MAC Layer Covert Channel Based On Supported Rates

G Teca, M Natkaniec - International Journal of Electronics and …, 2023 - journals.pan.pl
Wireless Local Area Networks present several vulnerabilities that are exploited, and as a
result, numerous attacks have been developed and used against them. Although …

Wired LAN and wireless LAN attack detection using signature based and machine learning tools

J Kaur - … and Data Knowledge Engineering: Volume 1, 2018 - Springer
There are various attack which is possible in the network, it may be from externally or
internally. But internal attacks are more dangerous than external. So, my mainly concern …

Manipulation and Detection of DOS attacks on IEEE802. 11 Protocol

KC Sriharipriya, GI Mary, R Abishek… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
When the concept of Wi-Fi was first commercialized, it didn't take much time to become a
household term. The comfort and easy of using a Wi-Fi network was unparalleled with the …