Follow
Mike Puchol
Mike Puchol
Other namesMiguel Puchol, Miguel Puchol Callmeier, Michael Puchol
CTO, Poa Internet
Verified email at poainternet.net - Homepage
Title
Cited by
Cited by
Year
Penetration Testing and Network Defense: Penetration Testing _1
A Whitaker, DP Newman
Cisco Press, 2005
1102005
WarDriving: Drive, detect, defend: A guide to wireless security
C Hurley
Elsevier, 2004
612004
WarDriving: Drive
C Hurley, M Puchol, R Rogers, F Thornton
Detect, Defend: A Guide to Wireless Security. sl: Syngress Publishing, 2004
61*2004
An exploration of user-generated wireless broadband infrastructures in digital cities
CA Middleton, A Bryne
Telematics and Informatics 28 (3), 163-175, 2011
542011
Wardriving and wireless penetration testing
C Hurley, R Rogers, F Thornton
Syngress, 2007
502007
Open source security tools
T Howlett
Prentice Hall, 2004
372004
A method for comparing and analyzing wireless security situations in two capital cities
D Dobrilovic, Z Stojanov, S Jäger, Z Rajnai
Acta Polytechnica Hungarica 13 (6), 67-86, 2016
322016
Is it good to share? A case study of FON and Meraki approaches to broadband provision
C Middleton, AB Potter
ITS Biennal Conference, Montreal, 2008
322008
Exploitation of Public and Private WiFi Coverage for New Business Models
T Lindner, L Fritsch, K Plank, K Rannenberg
Building the E-Service Society: E-Commerce, E-Business, and E-Government …, 2004
202004
Forensics and war-driving on unsecured wireless network
H Said, M Guimaraes, N Al Mutawa, I Al Awadhi
2011 International Conference for Internet Technology and Secured …, 2011
172011
The art of war driving and security threats-a Malaysian case study
B Issac, SM Jacob, LA Mohammed
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
172005
802.11 b wireless network visualization and radiowave propagation modeling
C Lentz
162003
The effect of internet services on child education outcomes: evidence from poa! Internet in Kenya
CY Okyere
Journal of Development Effectiveness 14 (1), 4-18, 2022
152022
Wireless cyber assets discovery visualization
K Prole, JR Goodall, AD D’Amico, JK Kopylec
International Workshop on Visualization for Computer Security, 136-143, 2008
92008
Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms
HB Tanveer, M Puchol, R Singh, A Bianchi, R Nithyanand
arXiv preprint arXiv:2307.00402, 2023
82023
Evaluation and illustration of a free software (FS) tool for wireless network monitoring and security
VA Clincy, KS Ajay
Journal of Computing Sciences in Colleges 21 (3), 19, 2006
52006
Herramientas de monitorización y análisis del tráfico en redes de datos
LC Rey, TOL Quiñones, LAM Alcántara
Telemática 11 (2), 46-59, 2012
4*2012
Security and dynamic encryption system in mobile ad-hoc network
HY Peter, UW Pooch
Mobile Ad-Hoc Networks: Protocol Design, 2011
42011
Modeling Starlink capacity
M Puchol
https://mikepuchol.com/modeling-starlink-capacity-843b2387f501, 2022
32022
Descubrimiento y geolocalización mediante redes Wi-Fi
C Pérez Blanco
12010
The system can't perform the operation now. Try again later.
Articles 1–20