ETGuard: Detecting D2D attacks using wireless Evil Twins. Jain, V., Laxmi, V., Gaur, M. S., & Mosbah, M. Comput. Secur., 83:389–405, 2019. Paper doi bibtex @article{DBLP:journals/compsec/JainLGM19,
author = {Vineeta Jain and
Vijay Laxmi and
Manoj Singh Gaur and
Mohamed Mosbah},
title = {ETGuard: Detecting {D2D} attacks using wireless Evil Twins},
journal = {Comput. Secur.},
volume = {83},
pages = {389--405},
year = {2019},
url = {https://doi.org/10.1016/j.cose.2019.02.014},
doi = {10.1016/J.COSE.2019.02.014},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/JainLGM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"742YxTSgRmYZfAXtF","bibbaseid":"jain-laxmi-gaur-mosbah-etguarddetectingd2dattacksusingwirelesseviltwins-2019","downloads":0,"creationDate":"2019-04-01T06:53:59.977Z","title":"ETGuard: Detecting D2D attacks using wireless Evil Twins","author_short":["Jain, V.","Laxmi, V.","Gaur, M. S.","Mosbah, M."],"year":2019,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/g/Gaur:Manoj_Singh","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Vineeta"],"propositions":[],"lastnames":["Jain"],"suffixes":[]},{"firstnames":["Vijay"],"propositions":[],"lastnames":["Laxmi"],"suffixes":[]},{"firstnames":["Manoj","Singh"],"propositions":[],"lastnames":["Gaur"],"suffixes":[]},{"firstnames":["Mohamed"],"propositions":[],"lastnames":["Mosbah"],"suffixes":[]}],"title":"ETGuard: Detecting D2D attacks using wireless Evil Twins","journal":"Comput. Secur.","volume":"83","pages":"389–405","year":"2019","url":"https://doi.org/10.1016/j.cose.2019.02.014","doi":"10.1016/J.COSE.2019.02.014","timestamp":"Mon, 28 Aug 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/compsec/JainLGM19.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/compsec/JainLGM19,\n author = {Vineeta Jain and\n Vijay Laxmi and\n Manoj Singh Gaur and\n Mohamed Mosbah},\n title = {ETGuard: Detecting {D2D} attacks using wireless Evil Twins},\n journal = {Comput. Secur.},\n volume = {83},\n pages = {389--405},\n year = {2019},\n url = {https://doi.org/10.1016/j.cose.2019.02.014},\n doi = {10.1016/J.COSE.2019.02.014},\n timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/compsec/JainLGM19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Jain, V.","Laxmi, V.","Gaur, M. S.","Mosbah, M."],"key":"DBLP:journals/compsec/JainLGM19","id":"DBLP:journals/compsec/JainLGM19","bibbaseid":"jain-laxmi-gaur-mosbah-etguarddetectingd2dattacksusingwirelesseviltwins-2019","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.cose.2019.02.014"},"metadata":{"authorlinks":{"gaur, m":"https://bibbase.org/dblp/Gaur:Manoj_Singh"}},"downloads":0},"search_terms":["etguard","detecting","d2d","attacks","using","wireless","evil","twins","jain","laxmi","gaur","mosbah"],"keywords":[],"authorIDs":["28AQmWdz4TfnhaQ2u"],"dataSources":["dvnZAb5DbKvsvGk9M","cXmBHMxXA7EJ6F5qG"]}