2018 IEEE 4th International Symposium on Wireless Systems Within the International Conferences on Intelligent Data Acquisition 2018
DOI: 10.1109/idaacs-sws.2018.8525538
|View full text |Cite
|
Sign up to set email alerts
|

Attackers' Wi-Fi Devices Metadata Interception for their Location Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Work [6] proposes an approach that allows unmasking the intruder. Metadata such as the SSID that their primary or secondary device is trying to connect to can be used to determine the name of an attacker's home access point.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Work [6] proposes an approach that allows unmasking the intruder. Metadata such as the SSID that their primary or secondary device is trying to connect to can be used to determine the name of an attacker's home access point.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%