Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments.
Ivan PalamàAlessandro AmiciGabriele BelliciniFrancesco GringoliFabio PedrettiGiuseppe BianchiPublished in: Comput. Commun. (2023)
Keyphrases
- security vulnerabilities
- malicious users
- countermeasures
- security risks
- attack scenarios
- information security
- security measures
- buffer overflow
- wifi
- denial of service
- dos attacks
- security mechanisms
- cyber attacks
- security threats
- access control
- security issues
- denial of service attacks
- user privacy
- network security
- intrusion detection
- data corruption
- security problems
- security flaws
- location information
- intrusion detection system
- sensitive data
- security policies
- alert correlation
- mobile devices
- sql injection
- unauthorized access
- attack detection
- user experience
- defense mechanisms
- attack graphs
- user authentication
- smart card
- wireless communication
- user interaction
- end users
- security properties
- security requirements
- end to end
- wireless networks
- smart phones
- attack graph
- ad hoc networks
- mobile applications