Sciweavers

163 search results - page 4 / 33
» WiFi attack vectors
Sort
View
VTC
2008
IEEE
117views Communications» more  VTC 2008»
14 years 4 months ago
Remote Medical Monitoring Through Vehicular Ad Hoc Network
Several diseases and medical conditions require constant monitoring of physiological signals and vital signs on daily bases, such as diabetics, hypertension and etc. In order to m...
Hyduke Noshadi, Eugenio Giordano, Hagop Hagopian, ...
HUC
2009
Springer
14 years 2 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
INFOCOM
2007
IEEE
14 years 4 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
CORR
2010
Springer
55views Education» more  CORR 2010»
13 years 9 months ago
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Yi-Hsun Wang, Ching-Hao Mao, Hahn-Ming Lee
COMPSEC
2007
63views more  COMPSEC 2007»
13 years 9 months ago
Biometric attack vectors and defences
Chris Roberts