نتایج جستجو برای: wi fi router

تعداد نتایج: 41996  

Journal: :Journal of Physics: Conference Series 2021

Journal: :The journal of the convergence on culture technology 2016

Journal: :CoRR 2007
Hao Hu Steven Myers Vittoria Colizza Alessandro Vespignani

In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch massive fraudulent attack and affect entire urban areas WiFi networks. In this paper we consider several scenarios for the deployment of malware that spreads solely over the wireless channel of major urban areas in the US....

2017
Hamdi Kavak Daniele Vernon-Bido Jose J. Padilla Saikou Y. Diallo Ross J. Gore

A study by Hu et al. (2009, PNAS, 106(5)) projected that a targeted malicious attack on Wi-Fi routers could infect a region in two days. The study also argued that the use of WPA security protocol in 60-70% routers would practically prevent such epidemics. This paper revisits their model with current Wi-Fi router data from WiGLE.net and a refined data selection method. We examine the temporalit...

Objective(s): The placenta provides nutrients and oxygen to embryo and removes waste products from embryo’s blood. As far as we know, the effects of exposure to Wi-Fi (2.4 GHz) signals on placenta have not been evaluated. Hence, we examined the effect of prenatal exposure to Wi-Fi signals on anti-oxidant capacity, expressions of CDKNA1, and GADD45a as well as apoptosis...

2011
S. Arun Kumar P. Mohan Kumar G. Jagadeesh

Nowadays available wireless routers do have extra levels of embedded security. Existing Wireless routers can be configured for invisible mode. So that wireless network cannot be scanned by outside wireless clients. If there is no configuration for wireless router, bandwidth of the Wi-Fi signal will be shared among all the nodes in wireless network equally. If configuration done for the wireless...

2009
Dmitriy Kuptsov Andrei V. Gurtov

Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemente...

Journal: :Jurnal Teknoinfo 2023

To connect to the internet, a device must have an internet connection via network, one of which is through wireless network or what called Wireless Fidelity (Wi-Fi). On Wi-Fi there router that used provide but signal from WI-FI limited. Then needs be strengthened with booster known as Repeater Extender. Repeaters are important devices for individuals, agencies and companies so desired areas get...

Journal: :E3S web of conferences 2021

Internet of Things connects various physical objects and form a network to do the services for sensing things without any human intervention. They compute data, retrieve data by connections made through IoT device components such as Sensors, Protocols, Address, etc., The Global Positioning System (GPS) is used localization in outer areas roads, ground but cannot be Indoor environment. So, while...

ژورنال: طب جنوب 2020
Atefi , Mohammad, Gheisari , Farshid, Masoumirad , Aref,

Background: Given the effects of ionizing radiation on biological tissues and their irreversible tissue damage, this project aimed to determine the synergic effect of TC99-m gamma radiation and non-ionizing radiation of Wi-Fi on sperm characteristics in rats. Materials and Methods: Sixty adult male rats, weighing 250-200 g randomly divided into four groups (three experimental groups and one co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید