Wireless Penetration Testing Method To Analyze WPA2-PSK System Security And Captive Portal
Abstract
Full Text:
PDFReferences
William Stallings. Network Security Essentials: Application and Standard Fourt Edition. Prentice Hall. 2011.
Habibi Lashkari, Arash & Danesh, Mir & Samadi, Behrang. (2009). A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). 10.1109/ICCSIT.2009.5234856.
Tariq, Muhammad. (2011). Wireless Security and Threats.
Choi, Jihyuk & Chang, Sang-Yoon & Ko, Diko & Hu, Yih-Chun. (2011). Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots. 1-5. 10.1109/icc.2011.5963508.
Xiao, Yang & Chen, Hui & Yang, Shuhui & Lin, Yi-Bing & Du, Ding-Zhu. (2009). Wireless Network Security. EURASIP J. Wireless Comm. and Networking. 2009. 10.1155/2009/532434.
Boukerche, Azzedine. (2002). Security and Fraud Detection in Mobile and Wireless Networks. 309 - 323. 10.1002/0471224561.ch14.
Kumar, Umesh & Gambhir, Sapna. (2014). A Literature Review of Security Threats to Wireless Networks. International Journal of Future Generation Communication and Networking. 7. 25-34. 10.14257/ijfgcn.2014.7.4.03.
Farooq Ahmed, Zain ul Abedin Butt, Ahmed Waqas, “Educational Roaming”. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No.1, January 2017
Iii, Guillermo & Phuong, Le & Kilaru, Aditya. (2005). Wireless Security Tools.. 562-568.
Sen, Jaydip. (2009). A Survey on Wireless Sensor Network Security. International Journal of Communication Networks and Information Security. 1. 59 – 82.
Goeritno, Arief & Aprianto, Yuggo & Basri, Hasan & , Ritzkal. (2017). PENERAPAN INTEGRASI CAPTIVE PORTAL DENGAN SINGLE SIGN ON (SSO) PADA LAYANAN HOTSPOT DAN SISTEM INFORMASI AKADEMIK.
Refbacks
- There are currently no refbacks.