Penetration Testing and Network Defense: Penetration Testing _1 A Whitaker, DP Newman Cisco Press, 2005 | 116 | 2005 |
WarDriving: Drive, detect, defend: A guide to wireless security C Hurley Elsevier, 2004 | 66 | 2004 |
WarDriving: Drive C Hurley, M Puchol, R Rogers, F Thornton Detect, Defend: A Guide to Wireless Security. sl: Syngress Publishing, 2004 | 66* | 2004 |
An exploration of user-generated wireless broadband infrastructures in digital cities CA Middleton, A Bryne Telematics and Informatics 28 (3), 163-175, 2011 | 57 | 2011 |
Wardriving and wireless penetration testing C Hurley, R Rogers, F Thornton Syngress, 2007 | 53 | 2007 |
Open source security tools T Howlett Prentice Hall, 2004 | 36 | 2004 |
Is it good to share? A case study of FON and Meraki approaches to broadband provision C Middleton, AB Potter ITS Biennal Conference, Montreal, 2008 | 34 | 2008 |
A method for comparing and analyzing wireless security situations in two capital cities D Dobrilovic, Z Stojanov, S Jäger, Z Rajnai Acta Polytechnica Hungarica 13 (6), 67-86, 2016 | 33 | 2016 |
Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms HB Tanveer, M Puchol, R Singh, A Bianchi, R Nithyanand arXiv preprint arXiv:2307.00402, 2023 | 23 | 2023 |
Exploitation of Public and Private WiFi Coverage for New Business Models T Lindner, L Fritsch, K Plank, K Rannenberg Building the E-Service Society: E-Commerce, E-Business, and E-Government …, 2004 | 22 | 2004 |
The art of war driving and security threats-a Malaysian case study B Issac, SM Jacob, LA Mohammed 2005 13th IEEE International Conference on Networks Jointly held with the …, 2005 | 17 | 2005 |
The effect of internet services on child education outcomes: evidence from poa! Internet in Kenya CY Okyere Journal of Development Effectiveness 14 (1), 4-18, 2022 | 16 | 2022 |
Forensics and war-driving on unsecured wireless network H Said, M Guimaraes, N Al Mutawa, I Al Awadhi 2011 International Conference for Internet Technology and Secured …, 2011 | 16 | 2011 |
802.11 b wireless network visualization and radiowave propagation modeling C Lentz | 15 | 2003 |
Wireless cyber assets discovery visualization K Prole, JR Goodall, AD D’Amico, JK Kopylec International Workshop on Visualization for Computer Security, 136-143, 2008 | 9 | 2008 |
Modeling Starlink capacity M Puchol https://mikepuchol.com/modeling-starlink-capacity-843b2387f501, 2022 | 6 | 2022 |
Evaluation and illustration of a free software (FS) tool for wireless network monitoring and security VA Clincy, KS Ajay Journal of Computing Sciences in Colleges 21 (3), 19, 2006 | 5 | 2006 |
Herramientas de monitorización y análisis del tráfico en redes de datos LC Rey, TOL Quiñones, LAM Alcántara Telemática 11 (2), 46-59, 2012 | 4* | 2012 |
Security and dynamic encryption system in mobile ad-hoc network HY Peter, UW Pooch Mobile Ad-Hoc Networks: Protocol Design, 2011 | 4 | 2011 |
Descubrimiento y geolocalización mediante redes Wi-Fi C Pérez Blanco | 1 | 2010 |