Cited By
View all- Shinde OKulkarni VPatani HRajput AJaiswal R(2024)A Survey: Network Attack Detection and Mitigation TechniquesSmart Trends in Computing and Communications10.1007/978-981-97-1320-2_22(263-275)Online publication date: 14-Jun-2024
- Wang KZheng YZhang QBai GQin MZhang DDong J(2022)Assessing certificate validation user interfaces of WPA supplicantsProceedings of the 28th Annual International Conference on Mobile Computing And Networking10.1145/3495243.3517026(501-513)Online publication date: 14-Oct-2022
- Tran Le DTran TDang KAlkanhel RMuthanna A(2022)Malware Spreading Model for Routers in Wi-Fi NetworksIEEE Access10.1109/ACCESS.2022.318224310(61873-61891)Online publication date: 2022
- Show More Cited By