×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms - Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens.pdf
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Network
/
Parent Folder
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms - Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens.pdf
PDF
2 years ago
483.18 kB
Copy Link
Wireless Security Design Overview - Nidal Aboudagga, Damien Giry, Jean-Jacques Quisquater (UCL Crypto Group).pdf
PDF
2 years ago
73.47 kB
Copy Link
Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone - Patrick Ventuzelo, Olivier Le Moal, Thomas Coudray (P1 Security).pdf
PDF
2 years ago
1.89 MB
Copy Link
SeaGlass: Enabling City-Wide IMSI-Catcher Detection - Peter Ney, Ian Smith, Gabriel Cadamuro, Tadayoshi Kohno.pdf
PDF
2 years ago
7.56 MB
Copy Link
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers - Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon.pdf
PDF
2 years ago
3.80 MB
Copy Link
Propagation Losses Through Common Building Materials: 2.4 GHz vs 5 GHz - Robert Wilson (University of Southern California).pdf
PDF
2 years ago
2.92 MB
Copy Link
Path loss prediction model for the over‐rooftop propagation environment of microwave band in suburban areas - Naoki Kita, Wataru Yamada, Akio Sato.pdf
PDF
2 years ago
640.22 kB
Copy Link
Opportunities and Limits of Remote Timing Attacks - Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi (Rice University).pdf
PDF
2 years ago
673.83 kB
Copy Link
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 - Mathy Vanhoef, Frank Piessens (KU Leuven).pdf
PDF
2 years ago
626.61 kB
Copy Link
Brute forcing Wi-Fi Protected Setup - Stefan Viehböck.pdf
PDF
2 years ago
896.17 kB
Copy Link
A Comparative Analysis of TCP Tahoe, Reno, New-Reno, SACK and Vegas - unknown.pdf
PDF
2 years ago
96.33 kB
Copy Link
DEFCON-18-Ahmad-WPA-Too-WP.pdf
PDF
2 years ago
370.94 kB
Copy Link
DEFCON-18-Ahmad-WPA-Too.pdf
PDF
2 years ago
1,004.99 kB
Copy Link
High Availability on MikroTik RouterOS - Guilherme Ramires.pdf
PDF
2 years ago
2.14 MB
Copy Link
Load Balancing Using PCC & RouterOS - Steve Discher.pdf
PDF
2 years ago
5.40 MB
Copy Link
Securing Your MikroTik Network - Andrew Thrift.pdf
PDF
2 years ago
1.30 MB
Copy Link
Securing networks with MikroTik RouterOS - Tom Smyth.pdf
PDF
2 years ago
559.29 kB
Copy Link
Taking advantage of MikroTik RouterOS inbuilt firewall - Martin Pína.pdf
PDF
2 years ago
157.21 kB
Copy Link
VLAN in MikroTik - Muhammed Khomeini Bin Abu.pdf
PDF
2 years ago
2.06 MB
Copy Link
Why is Internet traffic self-similar - Allen B. Downey. Downey.pdf
PDF
7 years ago
1.26 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.