:::

詳目顯示

回上一頁
題名:電信詐欺機房無線電波之嗅探系統
書刊名:刑事科學
作者:詹明華王嘉華
作者(外文):Chan, Ming-hwaWang, Chia-hua
出版日期:2022
卷期:86
頁次:頁105-125
主題關鍵詞:電信詐欺犯罪電信詐欺機房Wi-Fi
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:8
  • 點閱點閱:4
期刊論文
1.Akyildiz, I. F.、Su, W.、Sankarasubramaniam, Y.、Cayirci, E.(2002)。Wireless sensor networks: a survey。Computer Networks,38(4),393-422。  new window
2.Berghel, H.(2004)。Wireless Infidelity I: War driving。Communications of the ACM,47(9),21-26。  new window
3.Meng, K.、Xiao, Y.、Vrbsky, S. V.(2009)。Building a wireless capturing tool for WiFi。Security and Communication Networks,2(6),654-668。  new window
4.Oransirikul, T.、Nishide, R.、Piumarta, I.、Takada, H.(2014)。Measuring bus passenger load by monitoring Wi-Fi transmissions from mobile devices。Procedia Technology,18,120-125。  new window
5.Swiat, K.(2006)。The travelling menace: rogue hotspots。Computer Fraud & Security,2006(12),13-15。  new window
6.Noh, J.、Kim, J.、Cho, S.(2018)。Secure authentication and four-way handshake scheme for protected individual communication in public Wi-Fi networks。IEEE Access,6,16539-16548。  new window
會議論文
1.Sebbar, A.、Boulahya, S. E.、Mezzour, G.(2016)。An empirical study of Wi-Fi security and performance in morocco-wardriving in rabat。International Conference on Electrical and Information Technologies (ICEIT) 2016,362-367。  new window
2.Sergiou, K.、Al-Nemrat, A.、Benzaid, C.(2014)。Investigations in black-box penetration techniques on wireless networks: gathering digital evidence against cyber-intrusions。International Conference on Cybercrime, Security & Digital Forensics (Cyberforensics) 2014,81-100。  new window
學位論文
1.盧俊光(2007)。新興詐欺犯罪模式及其偵查作為之研究(碩士論文)。中央警察大學,桃園。  延伸查詢new window
2.邱佩俞(2012)。電信詐欺犯罪運作歷程及其查緝因應策略之研究(博士論文)。中央警察大學。new window  延伸查詢new window
3.謝浚鋒(2009)。電信詐欺犯罪模式與偵查之研究(碩士論文)。國立臺北大學。  延伸查詢new window
4.曾進忠(2010)。資通訊詐欺犯罪特性及歷程之研究(碩士論文)。國立臺北大學。  延伸查詢new window
5.曾雅芬(2016)。行騙天下:臺灣跨境電信詐欺犯罪網絡之分析(博士論文)。國立政治大學。new window  延伸查詢new window
6.李宏倫(2009)。台灣與國際合作打擊跨國電信詐欺犯罪之研究(碩士論文)。中央警察大學。  延伸查詢new window
7.林天福(2011)。新興詐欺犯罪之研究--以通訊科技方式詐騙為中心(碩士論文)。中央警察大學。  延伸查詢new window
8.Holgernes, E.(2010)。Detecting Identity Thefts In Open 802.11e Enabled Wireless Networks(碩士論文)。Norwegian University of Science and Technology。  new window
圖書
1.Astudillo, K.(2017)。Wireless Hacking 101。Babelcube Inc.。  new window
2.Sanders, C.(2017)。Practical packet analysis: using wireshark to solve real-world network problems。No Starch Press。  new window
3.Sak, B.、Ram, J. R.(2016)。Mastering Kali Linux wireless pentesting。Packt Publishing Ltd.。  new window
其他
1.(20141008)。802.11 Mgmt: Beacon Frame,https://mrncciew.com/2014/10/08/802-11-mgmt-beacon-frame/?wref=tp。  new window
2.(20141027)。CWAP 802.11-Probe Request/Response,https://mrncciew.com/2014/10/27/cwap-802-11-probe-requestresponse。  new window
3.Building the Cylinder (Can) Waveguide,http://www.wikarekare.org/Antenna/WaveguideCan.html。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top