|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 210 occurrences of 140 keywords
|
|
|
Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Ulrike Meyer, Susanne Wetzel |
A man-in-the-middle attack on UMTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 90-97, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, UMTS, mobile communication, GSM, man-in-the-middle attack |
68 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 75-91, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
68 | Xia Brustoloni, José Carlos Brustoloni |
Hardening Web browsers against man-in-the-middle and eavesdropping attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 489-498, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack |
63 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 557-563, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
63 | Khaled Ouafi, Raphael Overbeck, Serge Vaudenay |
On the Security of HB# against a Man-in-the-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 108-124, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HB, RFID, authentication protocols |
63 | Ronald Cramer, Ivan Damgård |
Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 75-87, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
58 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 1-21, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
58 | Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu |
A Note on the Cramer-Damgård Identification Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 385-390, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
?OR, Cryptography, identification scheme, man-in-the- middle attacks |
49 | Dennis Kügler |
"Man in the Middle" Attacks on Bluetooth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 149-161, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Dimitrios N. Serpanos, Richard J. Lipton |
Defense Against Man-in-the-Middle Attack in Client-Server Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pp. 9-14, 2001, IEEE Computer Society, 0-7695-1177-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Senda Hammouda, Zouheir Trabelsi |
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 942-946, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ARP cache poisoning attack, ARP protocol, man-in-the-middle attack |
45 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(3), pp. 59-65, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
45 | Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno |
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 479-490, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks |
45 | Claudio Soriente, Gene Tsudik, Ersin Uzun |
HAPADEP: Human-Assisted Pure Audio Device Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 385-400, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
User-Aided Security, Secure Device Pairing, Secure First Connect, Authentication Protocols, Man-in-the-Middle attacks |
45 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(4), pp. 5, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
45 | Jinn-ke Jan, Yi-Hwa Chen |
A New Efficient MAKEP for Wireless Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 347-350, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Wireless network, key distribution, Key exchange, Mutual authentication, Man-in-the-middle attack |
36 | Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 61-69, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DNS spoofing, MITM attacks, SIP, VoIP security |
36 | Julien Bringer, Hervé Chabanne |
Trusted-HB: A Low-Cost Version of HB + Secure Against Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(9), pp. 4339-4342, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jorge Belenguer, Carlos Miguel Tavares Calafate |
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 122-127, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Michel Baud, Max Felser |
Profinet IO-Device Emulator based on the Man-in-the-middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 11th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2006, September 20-22, 2006, Diplomat Hotel Prague, Czech Republic, pp. 437-440, 2006, IEEE, 0-7803-9758-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Rosario Gennaro |
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 220-236, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | N. Asokan, Valtteri Niemi, Kaisa Nyberg |
Man-in-the-Middle in Tunnelled Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 28-41, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Ori Eisen |
Catching the fraudulent Man-in-the-Middle and Man-in-the-Browser. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2010(4), pp. 11-12, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Stephen Farrell |
Why Didn't We Spot That? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 14(1), pp. 84-87, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security protocol development, practical security, SSL, TLS, man-in-the-middle |
32 | Adonis P. H. Fung, K. W. Cheung 0003 |
SSLock: sustaining the trust on entities brought by SSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 204-213, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
SSL trust management, domain naming convention, man-in-the-middle attacks |
32 | Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin |
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 243-252, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
UMTS AKA, redirection attack, authentication, Man-in-the-middle attack |
32 | Rafael Pass, Alon Rosen |
New and improved constructions of non-malleable cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 533-542, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle |
27 | Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
Simulation-Based Concurrent Non-malleable Commitments and Decommitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 91-108, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Ghaith Hammouri, Berk Sunar |
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 346-365, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HB+, tamper resilience, provable security, PUF |
27 | Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
Vulnerabilities of UMTS Access Domain Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 350-355, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS |
27 | Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel |
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 44-63, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Yuuki Takano, Naoki Isozaki, Yoichi Shinoda |
Multipath Key Exchange on P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 748-755, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 187-194, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
23 | Akane Kosugi, Kaoru Teranishi, Kiminao Kogiso |
Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 10535-10547, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Muteeb Bin Muzammil, Muhammad Bilal 0006, Sahar Ajmal, Sandile Charles Shongwe, Yazeed Yasin Ghadi |
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 6365-6375, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 23096-23121, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Dawei Sun, Inseok Hwang 0002, James Goppert |
A stealthy man-in-the-middle attack strategy for switched systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Sci. ![In: Int. J. Syst. Sci. 55(6), pp. 1206-1223, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Yingwen Zhang, Zhaoxia Peng, Guoguang Wen, Jinhuan Wang, Tingwen Huang |
Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 54(1), pp. 445-456, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Menglin Ma, Baojiang Cui |
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: Advances in Internet, Data & Web Technologies - The 12th International Conference on Emerging Internet, Data & Web Technologies, EIDWT 2024, Naples, Italy, 21-23 February 2024, pp. 394-403, 2024, Springer, 978-3-031-53554-3. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Ziyang Chen, Baojiang Cui, Zishuai Cheng |
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: Advances in Internet, Data & Web Technologies - The 12th International Conference on Emerging Internet, Data & Web Technologies, EIDWT 2024, Naples, Italy, 21-23 February 2024, pp. 404-414, 2024, Springer, 978-3-031-53554-3. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Huwaida T. Elshoush, Roua M. Mohammed, Mona T. Abdelhameed, Amel F. Mohammed |
Mitigating Man-in-the-middle Attack In Online Payment System Transaction Using Polymorphic AES Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 14(3), pp. 102-112, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
23 | D. Madhu, S. Vasuhi |
Lightweight Encryption Assisted Man-in-The-Middle Attack-Resilient Steganography Model for Secure Satellite Imagery Services: LEMARS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 45(2), pp. 2847-2869, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule, Cosmas Ifeanyi Nwakanma |
Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(8), pp. 280, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Filippos Giannakas, Christos Troussas, Akrivi Krouska, Ioannis Voyiatzis, Cleo Sgouropoulou |
Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 32(5), pp. 371-382, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Tengchao Ma, Changqiao Xu, Shujie Yang, Yiting Huang, Qingzhao An, Xiaohui Kuang, Luigi Alfredo Grieco |
A Mutation-Enabled Proactive Defense Against Service-Oriented Man-in-The-Middle Attack in Kubernetes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 72(7), pp. 1843-1856, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed, Ahmed Fakhfakh |
Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 12(1), pp. 262, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Hamidreza Fereidouni, Olga Fadeitcheva, Mehdi Zalai |
IoT and Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.02479, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha |
Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.00234, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Santosh Ganji, P. R. Kumar 0001 |
Seeing the Unseen: The REVEAL protocol to expose the wireless Man-in-the-Middle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.09213, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ebelechukwu Nwafor, Carter Schmidt, Habeeb Olufowobi |
IoT-MGSec: Mitigating Man-in-the-Middle Attacks in IoT Networks Using Graph-Based Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA ![In: International Conference on Machine Learning and Applications, ICMLA 2023, Jacksonville, FL, USA, December 15-17, 2023, pp. 1261-1266, 2023, IEEE, 979-8-3503-4534-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Hicham Amellal, Salma El Hajjami, Keshav Kaushik, Gunjan Chhabra, Suman Avdhesh Yadav |
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3I ![In: 6th International Conference on Contemporary Computing and Informatics, IC3I 2023, Gautam Buddha Nagar, India, September 14-16, 2023, pp. 513-519, 2023, IEEE, 979-8-3503-0448-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Santosh Ganji, P. R. Kumar 0001 |
Seeing the Unseen: The REVEAL Protocol to Catch the Wireless Man-in-the-Middle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S3@MobiCom ![In: Proceedings of the 14th ACM Wireless of the Students, by the Students, and for the Students (S3) Workshop, Madrid, Spain, 6 October 2023, pp. 3-4, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Aabila Tharzeen, Balasubramaniam Natarajan, Babji Srinivasan |
Phasor data correction and transmission system state estimation under Man-in-the-Middle attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT ![In: IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2023, Washington, DC, USA, January 16-19, 2023, pp. 1-5, 2023, IEEE, 978-1-6654-5355-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kichang Lee, Jonghyuk Yun, Jun Han 0001, JeongGil Ko |
Demo: Exploiting Indices for Man-in-the-Middle Attacks on Collaborative Unpooling Autoencoders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, MobiSys 2023, Helsinki, Finland, June 18-22, 2023, pp. 598-599, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCSP ![In: Computer, Communication, and Signal Processing. AI, Knowledge Engineering and IoT for Smart Systems - 7th IFIP TC 12 International Conference, ICCCSP 2023, Chennai, India, January 4-6, 2023, Revised Selected Papers, pp. 269-285, 2023, Springer, 978-3-031-39810-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Keiichiro Kimura, Yoshiaki Shiraishi, Masakatu Morii |
A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
candar ![In: Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28 - Dec. 1, 2023, pp. 11-19, 2023, IEEE, 979-8-3503-0670-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha |
Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIoT ![In: 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 7-10, 2023, pp. 345-351, 2023, IEEE, 979-8-3503-3761-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Marc Ruiz 0001, Jaume Comellas, Luis Velasco |
Man-in-the-Middle Attacks Through Re-Shaping I-Q Optical Constellations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OFC ![In: Optical Fiber Communications Conference and Exhibition, OFC 2023, San Diego, CA, USA, March 5-9, 2023, pp. 1-3, 2023, IEEE, 978-1-957171-18-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ziran Gao, Mahesh S. Illindala, Jiankang Wang |
Intrusion Detection System with Updated Structure and Feature Selection Algorithm for Man-In- The-Middle Attacks in the Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: IEEE Industry Applications Society Annual Meeting, IAS 2023, Nashville, TN, USA, October 29 - Nov. 2, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-2016-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Xuewei Feng, Qi Li 0002, Kun Sun 0001, Yuxiang Yang, Ke Xu 0002 |
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 3162-3177, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Brett Piggott, Siddhant Patil, Guohuan Feng, Ibrahim Odat, Rajdeep Mukherjee, Balakrishnan Dharmalingam, Anyi Liu |
Net-GPT: A LLM-Empowered Man-in-the-Middle Chatbot for Unmanned Aerial Vehicle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: IEEE/ACM Symposium on Edge Computing, SEC 2023, Wilmington, DE, USA, December 6-9, 2023, pp. 287-293, 2023, IEEE, 979-8-4007-0123-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Rishi Rani, Massimo Franceschetti |
Detection of Man-in-the-Middle Attacks in Model-Free Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
L4DC ![In: Learning for Dynamics and Control Conference, L4DC 2023, 15-16 June 2023, Philadelphia, PA, USA., pp. 993-1007, 2023, PMLR. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
23 | Rahul Gothwal, Gaurav Dharmani, Ramnik Singh Reen, Eslam G. AbdAllah |
Evaluation of Man-in-the-Middle Attacks and Countermeasures on Autonomous Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSA ![In: 10th International Conference on Dependable Systems and Their Applications, DSA 2023, Tokyo, Japan, August 10-11, 2023, pp. 502-509, 2023, IEEE, 979-8-3503-0477-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 210, pp. 118401, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sivasankari Nitiynandan, Somasundaram Kamalakkannan |
Detection and prevention of man-in-the-middle attack in iot network using regression modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Eng. Softw. ![In: Adv. Eng. Softw. 169, pp. 103126, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Osman Salem, Khalid Alsubhi, Aymen Shaafi, Mostafa Gheryani, Ahmed Mehaoua, Raouf Boutaba |
Man-in-the-Middle Attack Mitigation in Internet of Medical Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 18(3), pp. 2053-2062, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mahmood A. Al Shareeda, Selvakumar Manickam |
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 14(8), pp. 1543, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck |
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Wirel. Commun. Lett. ![In: IEEE Wirel. Commun. Lett. 11(4), pp. 856-860, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Han Wu, Sareh Rowlands, Johan Wahlström |
Man-in-the-Middle Attack against Object Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.07174, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.00579, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani |
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(6), pp. 4082-4098, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Bruno Sousa, Tiago Cruz 0001, Vasco Pereira, Miguel Arieiro |
Denial of Service and Man in The Middle attacks in Programmable Logic Controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
DOI RDF |
|
23 | N. Hemavathi |
Man-in-the-Middle Attack in Advanced Metering Infrastructure dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
DOI RDF |
|
23 | Andre Büttner, Nils Gruschka |
Protecting FIDO Extensions Against Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETAA ![In: Emerging Technologies for Authorization and Authentication - 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers, pp. 70-87, 2022, Springer, 978-3-031-25466-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mauro Conti, Eleonora Losiouk, Alessandro Visintin |
What you see is not what you get: a man-in-the-middle attack applied to video channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022, pp. 1723-1726, 2022, ACM, 978-1-4503-8713-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Alessandra Alvarez Olazabal, Jasmeet Kaur, Abel Yeboah-Ofori |
Deploying Man-In-the-Middle Attack on IoT Devices Connected to Long Range Wide Area Networks (LoRaWAN). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC2 ![In: IEEE International Smart Cities Conference, ISC2 2022, Pafos, Cyprus, September 26-29, 2022, pp. 1-7, 2022, IEEE, 978-1-6654-8561-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Walter Tiberti, Eleonora Di Fina, Andrea Marotta, Dajana Cassioli |
Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FNWF ![In: 2022 IEEE Future Networks World Forum, FNWF 2022, Montreal, QC, Canada, October 10-14, 2022, pp. 367-372, 2022, IEEE, 978-1-6654-6250-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Seungyong Moon, Gaon An, Hyun Oh Song |
Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Sixth AAAI Conference on Artificial Intelligence, AAAI 2022, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, IAAI 2022, The Twelveth Symposium on Educational Advances in Artificial Intelligence, EAAI 2022 Virtual Event, February 22 - March 1, 2022, pp. 7823-7830, 2022, AAAI Press, 978-1-57735-876-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Bhargavi Krishnamurthy, Sajjan G. Shiva |
Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIoT ![In: 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022, pp. 100-105, 2022, IEEE, 978-1-6654-8453-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Wenye Liu, Weiyang He, Bowen Hu, Chip-Hong Chang |
A Practical Man-in-the-Middle Attack on Deep Learning Edge Device by Sparse Light Strip Injection into Camera Data Lane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOCC ![In: 35th IEEE International System-on-Chip Conference, SOCC 2022, Belfast, United Kingdom, September 5-8, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-5985-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Krittika Das, Rajdeep Basu, Raja Karmakar |
Man-In-The-Middle Attack Detection Using Ensemble Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 13th International Conference on Computing Communication and Networking Technologies, ICCCNT 2022, Kharagpur, India, October 3-5, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-5262-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Rolando Trujillo-Rasua |
Secure memory erasure in the presence of man-in-the-middle attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 57, pp. 102730, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Xiao-Guang Zhang, Guang-Hong Yang, Saud Wasly |
Man-in-the-middle attack against cyber-physical systems under random access protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 576, pp. 708-724, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Haider Salim, Zhitang Li |
A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 23(1), pp. 72-85, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yanjun Pan, Ziqi Xu, Ming Li 0003, Loukas Lazos |
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.02731, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Muhammed Ali Yurdagul, Husrev Taha Sencar |
BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.16235, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig |
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.09162, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana E. Goulart, Katherine R. Davis 0001, Saman A. Zonouz |
Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.11455, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Bruno Sousa, Tiago Cruz 0001, Miguel Arieiro, Vasco Pereira |
An ELEGANT dataset with Denial of Service and Man in The Middle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.09380, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Seungyong Moon, Gaon An, Hyun Oh Song |
Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2112.05634, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana E. Goulart, Katherine R. Davis 0001, Saman A. Zonouz |
Man-in-the-middle attacks and defence in a power system cyber-physical testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Cyper-Phys. Syst.: Theory & Appl. ![In: IET Cyper-Phys. Syst.: Theory & Appl. 6(3), pp. 164-177, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Mladen Pavicic |
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 23(2), pp. 163, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Sajeda Akter, Sriram Chellappan, Tusher Chakraborty, Taslim Arefin Khan, Ashikur Rahman, A. B. M. Alim Al Islam |
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 18(6), pp. 3012-3023, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang 0001 |
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 18(5), pp. 2074-2087, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yanjun Pan, Ziqi Xu, Ming Li 0003, Loukas Lazos |
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: MobiHoc '21: The Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Shanghai, China, 26-29 July, 2021., pp. 231-240, 2021, ACM, 978-1-4503-8558-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Enkli Ylli, Julian Fejzaj |
Man in the Middle: Attack and Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTA-CSIT ![In: Proceedings of the 4th International Conference on Recent Trends and Applications in Computer Science and Information Technology, Tirana, Albania, May 21st - to - 22nd, 2021., pp. 198-204, 2021, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Paul Griffioen, Raffaele Romagnoli, Bruce H. Krogh, Bruno Sinopoli |
Resilient Control in the Presence of Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC ![In: 2021 American Control Conference, ACC 2021, New Orleans, LA, USA, May 25-28, 2021, pp. 4553-4560, 2021, IEEE, 978-1-6654-4197-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | T. J. OConnor, Dylan Jessee, Daniel Campos |
Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET @ USENIX Security Symposium ![In: CSET '21: Cyber Security Experimentation and Test Workshop, Virtual, 9 August 2021, pp. 58-62, 2021, ACM, 978-1-4503-9065-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck |
Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2021, Madrid, Spain, December 7-11, 2021, pp. 1-6, 2021, IEEE, 978-1-7281-8104-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Benjamin Dowling, Britta Hale |
Secure Messaging Authentication against Active Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021, pp. 54-70, 2021, IEEE, 978-1-6654-1491-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 381 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|