Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach
Journal Title: International Research Journal of Computer Science - Year 2017, Vol 0, Issue 0
Abstract
This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).
Authors and Affiliations
David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo
Sensible Mouse using Sixth Sense Technology
The main aim of Sixth Sense Technology has always been the to reduce the distance between our physical world and digital world. This has been done in numerous ways. The purpose of this paper is to present one such ways o...
Relation Extraction Based on Pattern Learning Approach
semantically, objects in unstructured document are related each other to perform a certain entity relation. This certain entity relation such: drug-drug interaction through their compounds, buyer-seller relationship thro...
Network Routing Problem in Multigraph
This paper tries to find an easy method for solving the problem of routing in computer network where the network is using multigraph. This is done mainly using comparison of weight or cost of various multi arcs between a...
Utilization of GPS Technology to Control Regional Development Project with the Efficient Use of Energy Consumption - Based Smartphone
GPS (Global Positioning System) has a variety of applications among which real-time tracking finds significance in day-to-day life. One of the technologies used to find locations by GPS (global positioning system). Servi...
A Study of Intrusion Detection System using Advanced Genetic Algorithm
As of today, we are relying more and more on Internet or network computer access, a growing problem intrusion into computer systems by unauthorized users has been observed. An intrusion is unauthorized access or attempte...