{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:29:29Z","timestamp":1729621769845,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/fskd.2012.6233783","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T19:43:25Z","timestamp":1342727005000},"page":"2133-2137","source":"Crossref","is-referenced-by-count":6,"title":["Assessment of security and vulnerability of home wireless networks"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Stimpson","sequence":"first","affiliation":[]},{"given":"Lu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianjun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hill","sequence":"additional","affiliation":[]},{"given":"Weining","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yongzhao","family":"Zhan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2009","journal-title":"Network Mapping with Kismet-newcore + Giskismet A Day with Tape","key":"17"},{"year":"2010","journal-title":"Kismet","key":"15"},{"year":"2010","journal-title":"BackTrack Linux","key":"16"},{"year":"2010","author":"beck","journal-title":"Enhanced TKIP Michael Attacks","key":"13"},{"year":"2005","author":"chandra","journal-title":"Security and Cryptography Bulletproof Wireless Security","key":"14"},{"year":"2006","author":"hurley","journal-title":"How to Cheat at Securing A Wireless Network","key":"11"},{"year":"2008","author":"pescatore","journal-title":"Gartner 2008 IT Security Threat Projection Timeline","key":"12"},{"year":"2010","journal-title":"Is WPA2 Backwards Compatible to WEP?","key":"3"},{"key":"2","doi-asserted-by":"crossref","first-page":"1716","DOI":"10.1016\/j.comcom.2004.05.022","article-title":"On a framework for energy-efficient security protocols in wireless networks","volume":"27","author":"prasithsangaree","year":"2004","journal-title":"Computer Communications"},{"year":"2008","author":"beck","journal-title":"Practical Attacks against WEP and WPA","key":"1"},{"year":"2010","journal-title":"Wireless Safety and Security Wireless Safety and Security |Help| BT com Help","key":"10"},{"year":"2007","author":"bradley","journal-title":"Essential Computer Security Everyone's Guide to Email Internet and Wireless Security","key":"7"},{"year":"2010","journal-title":"Please Explain the Various Security Standards & Algorithms","key":"6"},{"year":"2010","journal-title":"Wi-Fi Alliance to Dump WEP and TKIP Not Soon Enough","key":"5"},{"year":"2009","author":"ohigashi","journal-title":"A Practical Message Falsification Attack on WPA","key":"4"},{"year":"2002","author":"gast","journal-title":"802 11 Wireless Networks The Definitive Guide Creating and Administering Wireless Networks","key":"9"},{"year":"2010","journal-title":"Aircrack-ng Aircrack-ng Documentation","key":"8"}],"event":{"name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2012,5,29]]},"location":"Chongqing, Sichuan, China","end":{"date-parts":[[2012,5,31]]}},"container-title":["2012 9th International Conference on Fuzzy Systems and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6227654\/6233707\/06233783.pdf?arnumber=6233783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:38:04Z","timestamp":1497980284000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6233783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/fskd.2012.6233783","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}