Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,950,991 papers from all fields of science
Search
Sign In
Create Free Account
Evil twin (wireless networks)
Known as:
Evil Twin Attack
, Evil twin (disambiguation)
, Evil twin phishing
An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate, set up to eavesdrop on wireless communications.The evil twin is the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Cracking of wireless networks
HTTPS
Hotspot (Wi-Fi)
Password
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
DESIGN OF WIRELESS INTRUSION DETECTION SYSTEM FOR DOS ATTACK AND MALICIOUS ACCESS POINT IN WI-FI NETWORKS
G.Aloy Anuja Mary V.Rajavel
2020
Corpus ID: 219038229
The IEEE 802.11 wireless networks are organized either in infrastructure mode or ad-hoc mode. These wireless networks are very…
Expand
2018
2018
Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach
L. R. Horne
2018
Corpus ID: 86811363
2017
2017
Detection & Analysis of Evil Twin Attack in Wireless Network
Vishwa Modi
,
C. Parekh
2017
Corpus ID: 169238577
Due to increasing demand of wireless internet access open Wi-Fi internet service is available at public places and secured Wi-Fi…
Expand
2017
2017
Detection of Rogue Access Point to Prevent Evil Twin Attack in Wireless Network
Vishwa Modi
,
Asst. Prof. Chandresh Parekh
2017
Corpus ID: 168780466
- From last few years open wireless network commonly available in cafe shop, shopping malls, multiplexes restaurants and other…
Expand
2016
2016
Partha Paul 1 DETECTION AND PREVENTION AGAINST EVIL TWIN ATTACK IN WLAN
Anil Kumar
,
B. Raj
,
Partha Paul
2016
Corpus ID: 41146138
Wireless technology has developed a significant part of communication and for the data transmission. Wireless LAN effectively…
Expand
Review
2015
Review
2015
Hacker's toolbox: Detecting software-based 802.11 evil twin access points
Fabian Lanze
,
A. Panchenko
,
Ignacio Ponce-Alcaide
,
T. Engel
Consumer Communications and Networking Conference
2015
Corpus ID: 15469428
The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and…
Expand
2015
2015
New attacks on Wi-Fi Protected Setup
Hamed Mohtadi
,
Alireza Rahimi
2015
Corpus ID: 16854854
Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006…
Expand
2015
2015
METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points
Christian Szongott
,
Michael Brenner
,
Matthew Smith
Financial Cryptography
2015
Corpus ID: 931538
Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into…
Expand
2011
2011
DETECTING THE EVIL TWIN ATTACK IN A SINGLE HOP WIRELESS NETWORK USING FOUR-SQUARE ANTENNAS
M. Carrington
2011
Corpus ID: 57361385
Recent technological advances have increased the prevalence of wireless networks in our society. Users can easily access the…
Expand
2010
2010
Solution to the wireless evil-twin transmitter attack
P. Bhatia
,
Christine Laurendeau
,
M. Barbeau
Crisis
2010
Corpus ID: 17363072
In a wireless network comprising some receivers and a truth-teller transmitter, an attacker adds a malicious evil-twin…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required