Cited By
View all- Hoque NRahbari HBoureanu ISchneider SReaves BTippenhauer N(2023)Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi SystemsProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590185(275-285)Online publication date: 29-May-2023
- Schepers DRanganathan AVanhoef MJadliwala MKim YDmitrienko A(2022)On the Robustness of Wi-Fi Deauthentication CountermeasuresProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528548(245-256)Online publication date: 16-May-2022
- Garbelini MWang CChattopadhyay S(2022)Greyhound: Directed Greybox Wi-Fi FuzzingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.301462419:2(817-834)Online publication date: 1-Mar-2022
- Show More Cited By