-
Notifications
You must be signed in to change notification settings - Fork 0
Home
Sean Barrick edited this page Apr 10, 2024
·
8 revisions
Citation | |
---|---|
1 | M. Bohlooli, N. Ghazisaidi and H. Kassaei, "Integration of WiFi and WiMAX-Mesh Networks," in Advances in Mesh Networks, International Conference on, Athens/Glyfada, Greece, 2009 pp. 1-6. https://doi.ieeecomputersociety.org/10.1109/MESH.2009.8 |
2 | Ezozbek Tokhirov and Ravshan Aliev. "Analysis of the differences between Wi-Fi 6 and Wi-Fi 5," Tashkent State Transport University, 2023, https://www.e3s-conferences.org/articles/e3sconf/pdf/2023/39/e3sconf_transsiberia2023_03020.pdf |
3 | Efstratios Chatzoglou, Georgios Kambourakis, Constantinos Kolias, "How is your Wi-Fi connection today? DoS attacks on WPA3-SAE," Journal of Information Security and Applications, Volume 64, 2022, 103058, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2021.103058. |
4 | Erfan Mozaffariahrar, Fabrice Theoleyre and Michael Menth. "A Survey of Wi-Fi 6: Technologies, Advances, and Challenges," MDPI, 14 October 2022, https://www.mdpi.com/1999-5903/14/10/293. |
5 | F. Meneghello, M. Calore, D. Zucchetto, M. Polese and A. Zanella, "IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices," in IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8182-8201, Oct. 2019, https://research-ebsco-com.cobalt.champlain.edu/c/uomcmi/details/3bccrlthdb?q=IoT%20Devices. |
6 | https://ez01.skillport.com/skillportfe/assetSummaryPage.action?assetid=RW$120085:_ss_book:158695#summary/BOOKS/RW$120085:_ss_book:158695 |
7 | https://arstechnica.com/information-technology/2019/04/serious-flaws-leave-wpa3-vulnerable-to-hacks-that-steal-wi-fi-passwords/ |
8 | Great reference for WPA3 Hacking - https://www.youtube.com/watch?v=44I1wfgGT80 |
9 | Another reference for password cracking using Hashcat/JtR and Alfa Network adapter to monitor networks - https://github.com/morrownr/USB-WiFi/issues/275#issuecomment-1584042430 |
10 | Deauthentication hacking for WPA2 - https://sudorealm.com/blog/deauthentication-attack-using-kali-linux#the-art-of-deauthing |
11 | Downgrading WPA3 Attack - http://www.netprojnetworks.com/wpa3-downgrade-attack/ |