An experiment of hit-and-run wireless attacks.
J. Jenny LiJing-Chiou LiouPublished in: Int. J. Inf. Priv. Secur. Integr. (2017)
Keyphrases
- wireless networks
- wireless communication
- countermeasures
- mobile devices
- mobile users
- cellular networks
- traffic analysis
- remote control
- security threats
- security mechanisms
- real time
- computer security
- watermarking scheme
- terrorist attacks
- malicious users
- communication technologies
- watermarking algorithm
- security protocols
- access control
- digital images
- security risks
- malicious attacks
- wireless local area network