-
3
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Lecture Notes in Computer Science, Springer
-
S. R. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," in Selected Areas in Cryptography, Vol. 2259, pp. 1-24, Lecture Notes in Computer Science, Springer, 2001.
-
(2001)
Selected Areas in Cryptography
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
4
-
-
3142552643
-
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
-
A. Stubblefield, J. Ioannidis, and A. D. Rubin, "A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)," in ACM Transactions on Information and System Security, Vol. 7, No. 2, pp. 319-332, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 319-332
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
7
-
-
84908247589
-
WPA too!
-
M. S. Ahmad, "WPA Too!" in DEFCON 18, 2010.
-
(2010)
DEFCON
, vol.18
-
-
Ahmad, M.S.1
-
9
-
-
84962359508
-
Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset
-
C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, "Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset," in IEEE Communications Surveys and Tutorials, Vol. 18, No. 1, pp. 184-208, 2016.
-
(2016)
IEEE Communications Surveys and Tutorials
, vol.18
, Issue.1
, pp. 184-208
-
-
Kolias, C.1
Kambourakis, G.2
Stavrou, A.3
Gritzalis, S.4
-
11
-
-
84867781089
-
Hybrid intelligent intrusion detection scheme
-
Springer
-
M. A. Salama, H. F. Eid, R. A. Ramadan, A. Darwish, and A. E. Hassanien, "Hybrid intelligent intrusion detection scheme," in Soft Computing in Industrial Applications, pp. 293-303, Springer, 2011.
-
(2011)
Soft Computing in Industrial Applications
, pp. 293-303
-
-
Salama, M.A.1
Eid, H.F.2
Ramadan, R.A.3
Darwish, A.4
Hassanien, A.E.5
-
12
-
-
84884203185
-
Network anomaly detection with the restricted boltzmann machine
-
U. Fiore, F. Palmieri, A. Castiglione, and A. D. Santis, "Network anomaly detection with the restricted boltzmann machine," in Nerocomputing, Vol. 22, pp. 13-23, 2013.
-
Nerocomputing
, vol.22
, Issue.2013
, pp. 13-23
-
-
Fiore, U.1
Palmieri, F.2
Castiglione, A.3
Santis, A.D.4
-
14
-
-
84919328325
-
Role of feature selection in intrusion detection system for 802.11 networks
-
N. P. Neelakantan and C. Nagesh, "Role of feature selection in intrusion detection system for 802.11 networks," in International Journal on Smart Sensors Ad Hoc Network, Vol. 1, No. 1, pp. 98-101, 2011.
-
(2011)
International Journal on Smart Sensors Ad Hoc Network
, vol.1
, Issue.1
, pp. 98-101
-
-
Neelakantan, N.P.1
Nagesh, C.2
-
15
-
-
85042182032
-
A deep learning approach for network intrusion detection system
-
Q. Niyaz, W. Sun, A. Y. Javaid, and M. Alam, "A deep learning approach for network intrusion detection system," in EAI International Conference on Bio-inspired Information and Communications Technologies, pp. 21- 26, 2015.
-
(2015)
EAI International Conference on Bio-inspired Information and Communications Technologies
, pp. 21-26
-
-
Niyaz, Q.1
Sun, W.2
Javaid, A.Y.3
Alam, M.4
-
16
-
-
85019736647
-
-
accessed on 12 September 2016
-
KDD Cup, "Network traffic capture dataset," http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html, accessed on 12 September 2016.
-
Network Traffic Capture Dataset
-
-
-
17
-
-
85019731056
-
-
accessed on 12 September 2016
-
Aircrack-ng, "Wi-Fi network security tools," https://www.aircrackng. org, accessed on 12 September 2016.
-
Wi-Fi Network Security Tools
-
-
-
18
-
-
85019770552
-
-
accessed on 12 September 2016
-
KALI Tools, "Mdk3," http://tools.kali.org/wireless-attacks/mdk3, accessed on 12 September 2016.
-
Mdk3
-
-
-
19
-
-
84871173077
-
-
accessed on 12 September 2016
-
Metasploit, "Penetration testing software," https://www.metasploit.com, accessed on 12 September 2016.
-
Penetration Testing Software
-
-
-
20
-
-
85019695124
-
-
accessed on 12 September 2016
-
J. Wright, "File2air," http://www.willhackforsushi.com/?page id=19, accessed on 12 September 2016.
-
File2air
-
-
Wright, J.1
-
21
-
-
85019742556
-
-
accessed on 12 September 2016
-
Lorcon2, "Wireless packet injection," https://code.google.com/archive /p/lorcon, accessed on 12 September 2016.
-
Wireless Packet Injection
-
-
-
22
-
-
85019702360
-
-
accessed on 12 September 2016
-
TShark, "Network traffic analyser," https://www.wireshark.org, accessed on 12 September 2016.
-
Network Traffic Analyser
-
-
-
23
-
-
84973911419
-
Delving deep into rectifiers: Surpassing human-level performance on Image-Net classification
-
K. He, X. Zhang, S. Ren, and J. Sun, "Delving deep into rectifiers: surpassing human-level performance on Image-Net classification," in IEEE International Conference on Computer Vision (ICCV), 2015.
-
(2015)
IEEE International Conference on Computer Vision (ICCV)
-
-
He, K.1
Zhang, X.2
Ren, S.3
Sun, J.4
|