2019
DOI: 10.1016/j.comcom.2019.03.013
|View full text |Cite
|
Sign up to set email alerts
|

A solution to detect the existence of a malicious rogue AP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The content-based recommendation algorithm mainly uses the label categories of movies and the user's preference for movies with different labels to recommend [8]. If multiple movie categories are provided for the user to choose when a new user logs in to the system, movies that are more relevant to the user's favorite genre or that are more popular through category selection will be recommended.…”
Section: Content-based Recommendation Algorithmsmentioning
confidence: 99%
“…The content-based recommendation algorithm mainly uses the label categories of movies and the user's preference for movies with different labels to recommend [8]. If multiple movie categories are provided for the user to choose when a new user logs in to the system, movies that are more relevant to the user's favorite genre or that are more popular through category selection will be recommended.…”
Section: Content-based Recommendation Algorithmsmentioning
confidence: 99%
“…Yaibuates et al [24] try to identify malicious requests for IP addresses via DHCP, and combine the ICMP and ARP protocols. The paper of Hsu et al [25] suggests a method that uses a range of reverse traceroute data gathered by a remote server to identify the existence of a malicious rogue AP.…”
Section: Malicious Mac Address-related Mechanismsmentioning
confidence: 99%

Automated Wi-Fi intrusion detection tool on 802.11 networks

Dimitris Koutras,
Panos Dimitrellos,
Panayiotis Kotzanikolaou
et al. 2024
ITU J-FET
“…The round trip time of a packet exchanged between the user and the DNS server is used to detect the rogue nodes. In [14], the authors proposed Wi-Fi malicious rogue access point finder (RAF) to detect the presence of rogue nodes. RAF can be installed on any device without any special requirement.…”
Section: A Related Workmentioning
confidence: 99%