Wireless infidelity I: war driving

  • Authors:
  • Hal Berghel

  • Affiliations:
  • UNLV School of Computer Science and National Identity Theft and Financial Fraud Research and Operations Center

  • Venue:
  • Communications of the ACM - End-user development: tools that empower users to create their own software solutions
  • Year:
  • 2004

Quantified Score

Hi-index 0.02

Visualization

Abstract

Although WiFi technology security vulnerabilities are well known, the extent of these vulnerabilities may be surprising: War driving experiences identify many potential points of entry.