Wi-Fi Redux: Never Trust Untrusted Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 4
Abstract
This study analyzes the dangers posed to computer user information and their equipment as they connect to untrusted networks, such as those found in coffee shops. Included in this study is a virtualized lab consisting of the target and attacker nodes and router to facilitate communication. Also included are a binary for reverse connection and a modified binary that was created to connect back to the attacker node and bypasses most Anti-virus software.
Authors and Affiliations
Young B. Choi, Kenneth P. LaCroix
Wireless Sensor Networks for Road Traffic Monitoring
Wireless Sensor Networks (WSNs) consist of large number of sensor nodes. Each node is empowered by a com-munication interface that is mainly characterized by low power, short transmission distance and minimal data rate s...
Ranking Method in Group Decision Support to Determine the Regional Prioritized Areas and Leading Sectors using Garrett Score
The main objective of regional development is to achieve equal development in different regions. However, the long duration and complexity of the process may result in the unequal development of some regions. In order to...
Cryptic Mining in Light of Artificial Intelligence
The analysis of cryptic text is hard problem”, and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algor...
Forensic Analysis using Text Clustering in the Age of Large Volume Data: A Review
Exploring digital devices in order to generate digital evidence related to an incident being investigated is essential in modern digital investigation. The emergence of text clustering methods plays an important role in...
An Algorithm Research for Supply Chain Management Optimization Model
In this paper, we consider the extended linear complementarity problem on supply chain management optimization model. We first give a global error bound for the extended linear complementarity problem, and then propose a...