Wi-Fi Redux: Never Trust Untrusted Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 4
Abstract
This study analyzes the dangers posed to computer user information and their equipment as they connect to untrusted networks, such as those found in coffee shops. Included in this study is a virtualized lab consisting of the target and attacker nodes and router to facilitate communication. Also included are a binary for reverse connection and a modified binary that was created to connect back to the attacker node and bypasses most Anti-virus software.
Authors and Affiliations
Young B. Choi, Kenneth P. LaCroix
On Telemedicine Implementations in Ghana
Most Sub-Saharan Africa countries including Ghana experience a shortage of medical professionals, especially in the rural areas. This is mainly caused by the low-intake of students into medical schools due to inadequacy...
An Enhanced Fuzzy Multi Criteria Decision Making Model with A proposed Polygon Fuzzy Number
Decisions in real world applications are often made under the presence of conflicting, uncertain, incomplete and imprecise information. Fuzzy multi Criteria Decision making (FMCDM) approach provides a powerful approach f...
B2C E-Commerce Fact-Based Negotiation Using Big Data Analytics and Agent-Based Technologies
The focus of this study is application of intelligent agent in negotiation between buyer and seller in B2C Commerce using big data analytics. The developed model is used to conduct negotiations on behalf of prospective b...
Parallel Architecture for Face Recognition using MPI
The face recognition applications are widely used in different fields like security and computer vision. The recognition process should be done in real time to take fast decisions. Princi-ple Component Analysis (PCA) con...
Mapping Wheat Crop Phenology and the Yield using Machine Learning (ML)
Wheat has been a prime source of food for the mankind for centuries. The final wheat grain yield is the multitude of the complex interaction among the various yield attributes such as kernel per plant, Spike per plant, N...