Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,569 papers from all fields of science
Search
Sign In
Create Free Account
Rogue access point
A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Evil twin (wireless networks)
Man-in-the-middle attack
Piggybacking (Internet access)
Vulnerability scanner
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Rogue Access Point Localization Leveraging Compressive Sensing via Kernel Optimization
Q. Pu
,
J. Ng
,
Shijie Deng
,
Fawen Zhang
IEEE Wireless Communications and Networking…
2020
Corpus ID: 219990012
With the pervasive infrastructures of WLAN, user’s privacy has emerged as an important security and privacy problem. Rogue Access…
Expand
2017
2017
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
Rhongho Jang
,
Jeonil Kang
,
Aziz Mohaisen
,
Daehun Nyang
IEEE International Conference on Distributed…
2017
Corpus ID: 4771907
In this work, we introduce a powerful hardware-based rogue access point (PrAP), which can relay traffic between a legitimate AP…
Expand
2015
2015
Rogue Access Point Detection in Vehicular Environments
Hao Qu
,
Longjiang Guo
,
Weiping Zhang
,
Jinbao Li
,
Meirui Ren
Wireless Algorithms, Systems, and Applications
2015
Corpus ID: 42763152
The threat of rogue access points (APs) has attracted significant attentions from both industrial and academic researchers. This…
Expand
2015
2015
Traffic characteristics mechanism for detecting rogue access point in local area network
A. Amran
2015
Corpus ID: 111914729
Rogue Access Point (RAP) is a network vulnerability involving illicit usage of wireless access point in a network environment…
Expand
2013
2013
RAPD Algorithm: Detection of Rogue Access Point in Wireless Network
Dr. Sanjay Thakur
,
Abhijit S. Bodhe
2013
Corpus ID: 9859292
-The most challenging security concerns for IT industries today is the rogue wireless access point. Now a day’s IEEE 802.11…
Expand
2011
2011
Heterogeneous wireless LAN-based wireless network attack analysis and research
Chengjun Xu
,
Hongxia Wang
International Conference on Uncertainty Reasoning…
2011
Corpus ID: 21954848
Wireless LAN is a heterogeneous wireless network, the main broadband access networks, has been widely used in people's daily life…
Expand
2010
2010
The Intrusion Detection System design in WLAN based on rogue AP
X. Peng
,
Cheng-kang Zhang
,
Diangang Wang
International Conference on Computer Engineering…
2010
Corpus ID: 14923456
Wireless IDS (Intrusion Detection System) can help network system quickly identify attacks, which extends the system…
Expand
2010
2010
Detecting and eliminating Rogue Access Points in IEEE-802.11 WLAN - a multi-agent sourcing Methodology
V. Sriram
,
Gadadhar Sahoo
,
K. Agrawal
IEEE International Advance Computing Conference
2010
Corpus ID: 16767312
Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time…
Expand
2007
2007
Cafe Cracks: Attacks on Unsecured Wireless Networks
P. Moceri
2007
Corpus ID: 18369994
Mobile users demand high connectivity in today's world, often at the price of security. Requiring Internet access at the airport…
Expand
2007
2007
Securing the Wireless LANs Against Internal Attacks
G. Kbar
,
Wathiq Mansoor
International Conference on Mobile Ad-hoc and…
2007
Corpus ID: 5117821
Deploying wireless LANs (WLAN) at large scale is mainly affected by reliability, availability, performance, and security. These…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE