Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Monitor mode

Known as: RFMON 
Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We demonstrate passive RADAR interrogation of passive sensors: the non-cooperative signal source is analyzed to detect time… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2017
2017
Troubleshooting millimeter-wave (mm-wave) wireless networks is complex due to the directionality of the communication. Issues… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Wireless networks are unlike wired when it comes to security factor, they are considered fundamentally insecure due to its nature… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Iron roughneck is a kind of rotating screw device for drill pipes, which is multi-functional, safe and efficient. In the… Expand
Is this relevant?
2011
2011
Fourier transform, wavelet transformation, and Hilbert-Huang transformation (HHT) can be used to discuss the frequency… Expand
Is this relevant?
2011
2011
In this paper, the mobile ad hoc networks are proposed the each node participating in the network acts both host & router must be… Expand
  • figure 1.1
  • figure 1.2
  • figure 2.2
  • figure 2.3
  • figure 3.1
Is this relevant?
2009
2009
The location of mobile devices in a network can be used to provide services that locate users as well, making positioning and… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2007
2007
Not only the communication capabilities of 802.11, but also the capability to determine the position of mobile devices make 802… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The 802.11 encryption standard Wired Equivalent Privacy (WEP) is still widely used today despite the numerous discussions on its… Expand
  • table 1
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2005
2005
In this paper, we propose a new scheme, called ANTID, for detecting and filtering DDoS attacks which use spoofed packets to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?