C Rani, H Modares, R Sriram… - The Journal of …, 2016 - journals.sagepub.com
The federal aviation administration has estimated that by the year 2020, the United States will have over 30,000 drones. Nowadays, drones, also known as unmanned aerial vehicles …
The Internet of Things (IoT) is a disruptive technology that complements the usage of modern day information and communications technology (ICT) systems. IoT systems, with …
L Chyrun, L Chyrun, Y Kis, L Rybak - … of Decision Making and Problems of …, 2020 - Springer
This work is to create an information system that would provide a connection to the access point with encryption WPA2 Enterprise. The practical value of the results obtained is to …
A González Paz, D Beltrán Casanova… - Revista Universidad y …, 2016 - scielo.sld.cu
En este trabajo se caracterizan las posibles amenazas en redes inalámbricas, los protocolos de seguridad creados para las redes WLAN como: WEP, 802.11 i, WPA y WPA2 …
H Tange, B Andersen - 2013 16th International Symposium on …, 2013 - ieeexplore.ieee.org
AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall …
In the last decade, the digital forensic methodologies and techniques have advanced rapidly. They have many variations such as computer forensics, network forensics and in this …
DGF Punguil - Ciencias de la Ingeniería y Aplicadas, 2023 - 190.15.139.149
Este artículo aborda la seguridad de las redes WLAN en la zona urbana de Latacunga, evaluando la preferencia entre redes de acceso abierto y cerrado, así como las diferencias …
M Kaur, S Kaur, KS Saini - 2016 2nd International Conference …, 2016 - ieeexplore.ieee.org
In today's world abundant data travelled from node to node or from cluster head to node or vice versa in a Wireless Sensor Network (WSN). This data can be of any type but it must …
Dr. Novadean Watson-Stone, Thesis Professor The proliferation of wireless access to privileged networks in the enterprise introduces a potentially large attack surface and a …