- Berghel, H. and Hoelzer, D. Pernicious Ports. Comm. ACM 48, 12 (Dec. 2005), 23--30. Google ScholarDigital Library
- CA Security Advisor; http://www3.ca.com/securityadvisorGoogle Scholar
- Chenoweth, T., Minch, R. and Tabor, S. User security behavior on wireless networks: An empirical study. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences (IEEE Computer Society, Jan. 2007). Google ScholarDigital Library
- Duffy, J. Wi-Fi hot spots multiply around the world. Network World; http://www.networkworld.com/news/2006/110206-hotspots.html.Google Scholar
- Housley, R., Arbaugh, W. Security Problems In 802.11-Based Networks. Comm. ACM 46, 5, (May 2003), 31--34. Google ScholarDigital Library
- Lee, A.J., Koenig, G.A., Meng, X and Yurcik, W. Searching for open windows and unlocked doors: Port scanning in large-scale commodity clusters. IEEE International Symposium on Cluster Computing and the Grid, May 2005. Google ScholarDigital Library
- PANDA Software International. Security in wireless networks; http://vocuspr.vocus.com/VocusPR30/Temp/Sites/2631/28d2f2c9bfeb4c808531a849e150d810/WP%20Wifi.pdfGoogle Scholar
- Poole, C. Wireless information security. In Information Technology Security, Advice from Experts, Lawrence Oliva, Ed. CyberTech Publishing, London, 2004, 110--143.Google Scholar
- Potter, B. Wireless hotspots: Petri dish of wireless security. Comm. ACM 49, 6, (June 2006), 51--56. Google ScholarDigital Library
- Schmidt, T. and Townsend, A. Why Wi-Fi wants to be free. Comm. ACM 46, 5, (May 2003), 47--52. Google ScholarDigital Library
- Yu, J., Liu, C., and Ku, C. Wireless trust: conceptual and operational definition. International Journal of Mobile Communication 2, 1, (2004), 38--49 Google ScholarDigital Library
Index Terms
- Wireless insecurity: examining user security behavior on public networks
Recommendations
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code
AbstractInsecurity Refactoring is a change to the internal structure of software to inject a vulnerability without changing the observable behavior in a normal use case scenario. An implementation of Insecurity Refactoring is formally explained to inject ...
The Insecurity of Wireless Networks
Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure ...
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures
MobiCom '21: Proceedings of the 27th Annual International Conference on Mobile Computing and NetworkingMore than 150 cellular networks worldwide have rolled out massive IoT services such as smart metering and environmental monitoring. Such cellular IoT services share the existing cellular network architecture with non-IoT (e.g., smartphone) ones. When ...
Comments