Login / Signup
The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method.
Chia-Mei Chen
Tien-Ho Chang
Published in:
AsiaJCIS (2015)
Keyphrases
</>
brute force
computational cost
preprocessing
cost function
high accuracy
computationally efficient
detection method
high efficiency
significant improvement
pairwise
computational complexity
clustering method
exhaustive search
dynamic programming
neural network
high precision
computationally expensive
learning algorithm