Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,031,155 papers from all fields of science
Search
Sign In
Create Free Account
MAC filtering
Known as:
MAC address filtering
, MAC blocking
In computer networking, MAC Filtering (or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Access control
Blacklist (computing)
Cracking of wireless networks
MAC address
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
A REVIEW OF MAC ADDRESS FILTERING AND SPOOFING IN WINDOWS OPERATING SYSTEM
S. Senthilkumar
,
C. Kumuthini
,
P. Dineshkumar
2017
Corpus ID: 67100359
MAC (Media Access Control) is a part of data link layer in OSI model, which takes high responsibility to data interchange and…
Expand
2017
2017
Investigation of security and QoS on SDN firewall using MAC filtering
Perumalraja Rengaraju
,
S. Kumar
,
Chung-Horng Lung
International Conference on Computational…
2017
Corpus ID: 26219232
Software Defined Networking (SDN) is the latest trend in the networking domain. In SDN, the control plane is decoupled from the…
Expand
2017
2017
Lagrange Interpolation for Mobile Agent Connection Encryption
Ibn al-Haitham
,
H. K. Homood
2017
Corpus ID: 150241903
A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the…
Expand
2016
2016
A Study of Distinctive tools to hack wireless network
G. Singh
2016
Corpus ID: 63970361
Wireless security is the prevention of illegal access or destruction to computer systems that are using wireless networks. The…
Expand
2012
2012
Towards an adaptive QoS-oriented and secure framework for wireless sensor networks in emergency situations
Rachid Haji
,
A. Hasbi
,
Mohamed Ghallali
,
B. E. Ouahidi
International Conference on Multimedia Computing…
2012
Corpus ID: 16978102
In an emergency situation, the information availability, reliability, security and delay of its delivery are critical to the…
Expand
2011
2011
A Comparative Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless
A. L
,
Vani B
2011
Corpus ID: 2699284
Denial of Service (DoS) attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for…
Expand
2010
2010
Security Research on WEP of WLAN
Peisong Ye
,
Guangxue Yue
2010
Corpus ID: 14297714
Wires Equivalent Privacy (WEP) is used to improve the security of wireless LAN (WLAN). By analyzing the weaknesses of WEP and RC4…
Expand
2010
2010
Using Power Hopping to Counter MAC Spoof Attacks in WLAN
Vijayakrishnan Nagarajan
,
V. Arasan
,
Dijiang Huang
7th IEEE Consumer Communications and Networking…
2010
Corpus ID: 18861158
IEEE 802.11-based Wireless LANs (WLANs) are deployed in public places, universities, offices and shops. The main reason for the…
Expand
2008
2008
Discuss of multicast mechanism in EPON
Cheng Chuanqing
,
C. Chuanhui
,
Wang Li
IEEE Conference on Industrial Electronics and…
2008
Corpus ID: 34778262
While internet gets rapid growth, the demand of service gets a rapid growth. As the trunk network is tending toward perfection…
Expand
2007
2007
A Solution to WLAN Authentication and Association DoS Attacks
Chibiao Liu
,
James T. Yu
2007
Corpus ID: 6405337
The growing popularity of the 802.11-based Wireless LAN (WLAN) also increases its risk of security attacks. The new WLAN security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE