Mitigating Evil Twin Attacks in 802.11.
Kevin S. BauerHarold GonzalesDamon McCoyPublished in: IPCCC (2008)
Keyphrases
- real time
- countermeasures
- risk management
- malicious attacks
- watermarking scheme
- malicious users
- watermarking algorithm
- security protocols
- attack detection
- differential power analysis
- multiresolution
- cyber attacks
- computer security
- chosen plaintext
- injection attacks
- security flaws
- security threats
- security problems
- case study
- information systems
- information retrieval
- data mining
- neural network