The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method.
Chia-Mei ChenTien-Ho ChangPublished in: AsiaJCIS (2015)
Keyphrases
- brute force
- computational cost
- preprocessing
- cost function
- high accuracy
- computationally efficient
- detection method
- high efficiency
- significant improvement
- pairwise
- computational complexity
- clustering method
- exhaustive search
- dynamic programming
- neural network
- high precision
- computationally expensive
- learning algorithm