ETGuard: Detecting D2D Attacks using Wireless Evil Twins.
Vineeta JainVijay LaxmiManoj Singh GaurMohamed MosbahPublished in: CoRR (2019)
Keyphrases
- wireless networks
- image registration
- pose estimation
- wireless communication
- computer simulation
- mobile users
- watermarking scheme
- mobile networks
- countermeasures
- mobile devices
- detecting malicious
- network intrusion detection systems
- detect malicious
- malicious activities
- malicious users
- security risks
- traffic analysis
- wireless mesh networks
- dos attacks
- mobile ad hoc networks
- communication technologies