{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T22:04:13Z","timestamp":1746828253245,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icccn.2017.8038416","type":"proceedings-article","created":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T16:33:46Z","timestamp":1505752426000},"page":"1-11","source":"Crossref","is-referenced-by-count":4,"title":["EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures"],"prefix":"10.1109","author":[{"given":"Ala","family":"Altaweel","sequence":"first","affiliation":[]},{"given":"Radu","family":"Stoleru","sequence":"additional","affiliation":[]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Introduction to continuous entropy","year":"2013","author":"marsh","key":"ref38"},{"journal-title":"Rogue Access Point Detection Automatically Detect and Manage Wireless Threats to Your Network","year":"2004","key":"ref33"},{"journal-title":"The Airmagnet Project","year":"0","key":"ref32"},{"journal-title":"Wisentry","year":"0","key":"ref31"},{"journal-title":"GLOBECOM'07","year":"0","author":"watkins","key":"ref30"},{"journal-title":"Engineering Statistics Handbook","article-title":"National Institute of Standards and Technology","year":"2003","key":"ref37"},{"journal-title":"Cyanogenmod code","year":"0","key":"ref36"},{"journal-title":"RF Path Loss & Transmission Distance Calculations Technical Memorandum","year":"2006","author":"debus","key":"ref35"},{"journal-title":"MASS&#x2019; 11","year":"0","author":"stoleru","key":"ref34"},{"journal-title":"SecureComm &#x2018;09","year":"0","author":"venkataraman","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"journal-title":"TIRED OF ROGUES? Solutions for Detecting and Eliminating Rogue Wireless Networks","year":"2011","key":"ref12"},{"journal-title":"MobiSys &#x2018;04","year":"0","author":"bahl","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997491"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2207383"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2433898"},{"journal-title":"ACSW'06","year":"0","author":"gill","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.04.081447"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"journal-title":"GLOBE-COM &#x2018;04","year":"0","author":"beyah","key":"ref28"},{"journal-title":"Wi-fi protected setup online pin brute force vulnerability cert vulnerability note vu#723755","year":"2011","author":"viehbck","key":"ref4"},{"journal-title":"MIL COM &#x2018;07","year":"0","author":"shetty","key":"ref27"},{"journal-title":"Wi-Fi Protected Setup Specification Version 1 0h","year":"2006","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2015.7410302"},{"journal-title":"BROADNETS &#x2018;07","year":"0","author":"yin","key":"ref29"},{"journal-title":"Wi-fi protected setup pixie dust offline pin brute force vulnerability","year":"2014","author":"bongard","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2159990"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7348021"},{"year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2008.126","volume":"8","author":"wei","year":"2009","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6549288"},{"journal-title":"Modern Multidim Ensional Scaling Ser Springer Series in Statistics","year":"2005","author":"borg","key":"ref20"},{"volume":"9","journal-title":"Interworking with External Networks","year":"2011","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.28"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498334"},{"journal-title":"Google Play Store","year":"0","key":"ref23"},{"journal-title":"NETWORKING &#x2018;07","year":"0","author":"baiarnonte","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062077"}],"event":{"name":"2017 26th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2017,7,31]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2017,8,3]]}},"container-title":["2017 26th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8038296\/8038338\/08038416.pdf?arnumber=8038416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T12:47:12Z","timestamp":1570106832000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8038416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icccn.2017.8038416","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}