{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:05:21Z","timestamp":1730214321296,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/desec.2018.8625156","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T22:35:19Z","timestamp":1551393319000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["The Method of Capturing the Encrypted Password Packets of WPA &amp; WPA2, Automatic, Semi-Automatic or Manual?"],"prefix":"10.1109","author":[{"given":"Tien-Ho","family":"Chang","sequence":"first","affiliation":[]},{"given":"Jiunn-Wu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chia-Mei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Gu-Hsin","family":"Lai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2324572"},{"key":"ref11","first-page":"1684","article-title":"A Survey on Security Attacks in Wireless Sensor Network","volume":"1","author":"wahid","year":"2012","journal-title":"International Journal for Innovative Research in Science and Technology on Proceedings"},{"key":"ref12","first-page":"3","article-title":"Study of Characteristics of RSSI Signal","author":"wu","year":"2008","journal-title":"Industrial Technology IEEE International Conference"},{"key":"ref13","first-page":"113","article-title":"A Novel Approach for Detection of Sybil Attack in Wireless Sensor Networks","volume":"2","author":"khanderiya","year":"2016","journal-title":"IJSRSET"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.14"},{"journal-title":"Aircrack-ng","year":"2018","key":"ref15"},{"journal-title":"Pyrit","year":"2018","key":"ref16"},{"journal-title":"Gerix-wifi-cracker","year":"2018","key":"ref17"},{"key":"ref4","first-page":"3","article-title":"Study of Characteristics of RSSI Signal","author":"wu","year":"2008","journal-title":"ICIT 2008 IEEE International Conference"},{"key":"ref3","first-page":"62","author":"luminita","year":"2012","journal-title":"Wireless LAN Security-WpA2-psk Case Study AWER Procedia Information Technology and Computer Science"},{"key":"ref6","first-page":"246","article-title":"Detection of De-Authentication DoS Attacks in Wi-Fi Networks.: A Machine Learning Approach","author":"agarwal","year":"2016","journal-title":"SMC 2015-IEEE International Conference on Systems Man and Cybernetics IEEE"},{"key":"ref5","first-page":"34","article-title":"Vulnerabilities of Wireless Security Protocols (WEP and WPA2)","volume":"1","author":"kumkar","year":"2012","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology"},{"key":"ref8","first-page":"173","article-title":"Detection and Mitigation of Wireless Link Layer Attacks","author":"aye","year":"2017","journal-title":"Software Engineering Research Management and Applications (SERA) IEEE 15th International Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICA-ACCA.2016.7778423"},{"journal-title":"Connected IoT","year":"2018","key":"ref2"},{"journal-title":"Wigle net General Stats","year":"2018","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTM.2015.7225410"}],"event":{"name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2018,12,10]]},"location":"Kaohsiung, Taiwan","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8614461\/8625077\/08625156.pdf?arnumber=8625156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T05:51:26Z","timestamp":1598248286000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8625156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/desec.2018.8625156","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}