Cited By
View all- Kuo EChang MKao D(2018)User-side evil twin attack detection using time-delay statistics of TCP connection termination2018 20th International Conference on Advanced Communication Technology (ICACT)10.23919/ICACT.2018.8323700(211-216)Online publication date: Feb-2018
- Webb ANarasima Reddy A(2016)Finding proxy users at the service using anomaly detection2016 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2016.7860473(82-90)Online publication date: Oct-2016
- Mónica DRibeiro C(2011)WiFiHop - mitigating the Evil twin attack through multi-hop detectionProceedings of the 16th European conference on Research in computer security10.5555/2041225.2041228(21-39)Online publication date: 12-Sep-2011
- Show More Cited By