2021
DOI: 10.1016/j.comnet.2021.108359
|View full text |Cite
|
Sign up to set email alerts
|

A systematic methodology for continuous WLAN abundance and security analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 8 publications
0
2
0
1
Order By: Relevance
“…e objective of the work in [34] is to provide a technique for collecting, analyzing, and storing WLAN survey data that is efficient, scalable, and easily accessible. is was accomplished using wardriving with publicly available opensource software and commercially available hardware.…”
Section: Related Workmentioning
confidence: 99%
“…e objective of the work in [34] is to provide a technique for collecting, analyzing, and storing WLAN survey data that is efficient, scalable, and easily accessible. is was accomplished using wardriving with publicly available opensource software and commercially available hardware.…”
Section: Related Workmentioning
confidence: 99%
“…Adapun informasi yang didapatkan diantaranya nama jaringan, tipe enkripsi, merk dari perangkat, dan lokasi pancaran gelombang [7]. Wardriving dengan menganalisis pancaran sinyal Access Point memungkinkan informasiinformasi yang didapatkan dalam bentuk data tabel analisis keamanan jaringan yang dapat membantu proses inspeksi/operasi intelijen penegak hukum [8].…”
Section: Pendahuluanunclassified
“…In this context [6], information technology may be described as a double-edged sword because it can have both negative and positive effects [7,8]. It is described as a double-edged sword [9] because it can have both negative and positive effects [10]. The positive impact is the emergence of conveniences in the search for information [11], but it is also balanced by the negative impact with the emergence of various crimes against individuals [12] and groups by utilizing information technology and the internet or often referred to as cybercrime [13].…”
Section: Introductionmentioning
confidence: 99%