|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 210 occurrences of 140 keywords
|
|
|
Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Ulrike Meyer, Susanne Wetzel |
A man-in-the-middle attack on UMTS.  |
Workshop on Wireless Security  |
2004 |
DBLP DOI BibTeX RDF |
authentication, UMTS, mobile communication, GSM, man-in-the-middle attack |
68 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks.  |
TRUST  |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
68 | Xia Brustoloni, José Carlos Brustoloni |
Hardening Web browsers against man-in-the-middle and eavesdropping attacks.  |
WWW  |
2005 |
DBLP DOI BibTeX RDF |
eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack |
63 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks.  |
ISCC  |
2009 |
DBLP DOI BibTeX RDF |
|
63 | Khaled Ouafi, Raphael Overbeck, Serge Vaudenay |
On the Security of HB# against a Man-in-the-Middle Attack.  |
ASIACRYPT  |
2008 |
DBLP DOI BibTeX RDF |
HB, RFID, authentication protocols |
63 | Ronald Cramer, Ivan Damgård |
Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation.  |
EUROCRYPT  |
1997 |
DBLP DOI BibTeX RDF |
|
58 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials.  |
EuroPKI  |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
58 | Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu |
A Note on the Cramer-Damgård Identification Scheme.  |
WINE  |
2005 |
DBLP DOI BibTeX RDF |
?OR, Cryptography, identification scheme, man-in-the- middle attacks |
49 | Dennis Kügler |
"Man in the Middle" Attacks on Bluetooth.  |
Financial Cryptography  |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Dimitrios N. Serpanos, Richard J. Lipton |
Defense Against Man-in-the-Middle Attack in Client-Server Systems.  |
ISCC  |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Senda Hammouda, Zouheir Trabelsi |
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks.  |
IWCMC  |
2009 |
DBLP DOI BibTeX RDF |
ARP cache poisoning attack, ARP protocol, man-in-the-middle attack |
45 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication.  |
Computer  |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
45 | Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno |
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications.  |
CCS  |
2008 |
DBLP DOI BibTeX RDF |
context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks |
45 | Claudio Soriente, Gene Tsudik, Ersin Uzun |
HAPADEP: Human-Assisted Pure Audio Device Pairing.  |
ISC  |
2008 |
DBLP DOI BibTeX RDF |
User-Aided Security, Secure Device Pairing, Secure First Connect, Authentication Protocols, Man-in-the-Middle attacks |
45 | José Carlos Brustoloni |
Laboratory experiments for network security instruction.  |
ACM J. Educ. Resour. Comput.  |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
45 | Jinn-ke Jan, Yi-Hwa Chen |
A New Efficient MAKEP for Wireless Communications.  |
AINA (2)  |
2004 |
DBLP DOI BibTeX RDF |
Wireless network, key distribution, Key exchange, Mutual authentication, Man-in-the-middle attack |
36 | Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.  |
AsiaCCS  |
2009 |
DBLP DOI BibTeX RDF |
DNS spoofing, MITM attacks, SIP, VoIP security |
36 | Julien Bringer, Hervé Chabanne |
Trusted-HB: A Low-Cost Version of HB + Secure Against Man-in-the-Middle Attacks.  |
IEEE Trans. Inf. Theory  |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jorge Belenguer, Carlos Miguel Tavares Calafate |
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments.  |
SECURWARE  |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Michel Baud, Max Felser |
Profinet IO-Device Emulator based on the Man-in-the-middle Attack.  |
ETFA  |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Rosario Gennaro |
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks.  |
CRYPTO  |
2004 |
DBLP DOI BibTeX RDF |
|
36 | N. Asokan, Valtteri Niemi, Kaisa Nyberg |
Man-in-the-Middle in Tunnelled Authentication Protocols.  |
Security Protocols Workshop  |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Ori Eisen |
Catching the fraudulent Man-in-the-Middle and Man-in-the-Browser.  |
Netw. Secur.  |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Stephen Farrell |
Why Didn't We Spot That?  |
IEEE Internet Comput.  |
2010 |
DBLP DOI BibTeX RDF |
security protocol development, practical security, SSL, TLS, man-in-the-middle |
32 | Adonis P. H. Fung, K. W. Cheung 0003 |
SSLock: sustaining the trust on entities brought by SSL.  |
AsiaCCS  |
2010 |
DBLP DOI BibTeX RDF |
SSL trust management, domain naming convention, man-in-the-middle attacks |
32 | Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin |
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS.  |
SSIRI  |
2009 |
DBLP DOI BibTeX RDF |
UMTS AKA, redirection attack, authentication, Man-in-the-middle attack |
32 | Rafael Pass, Alon Rosen |
New and improved constructions of non-malleable cryptographic protocols.  |
STOC  |
2005 |
DBLP DOI BibTeX RDF |
non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle |
27 | Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
Simulation-Based Concurrent Non-malleable Commitments and Decommitments.  |
TCC  |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Ghaith Hammouri, Berk Sunar |
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.  |
ACNS  |
2008 |
DBLP DOI BibTeX RDF |
HB+, tamper resilience, provable security, PUF |
27 | Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
Vulnerabilities of UMTS Access Domain Security Architecture.  |
SNPD  |
2008 |
DBLP DOI BibTeX RDF |
UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS |
27 | Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel |
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges.  |
DIMVA  |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Yuuki Takano, Naoki Isozaki, Yoichi Shinoda |
Multipath Key Exchange on P2P Networks.  |
ARES  |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key.  |
ICCSA (2)  |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
23 | Akane Kosugi, Kaoru Teranishi, Kiminao Kogiso |
Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks.  |
IEEE Access  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Muteeb Bin Muzammil, Muhammad Bilal 0006, Sahar Ajmal, Sandile Charles Shongwe, Yazeed Yasin Ghadi |
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking.  |
IEEE Access  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.  |
IEEE Access  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Dawei Sun, Inseok Hwang 0002, James Goppert |
A stealthy man-in-the-middle attack strategy for switched systems.  |
Int. J. Syst. Sci.  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Yingwen Zhang, Zhaoxia Peng, Guoguang Wen, Jinhuan Wang, Tingwen Huang |
Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation.  |
IEEE Trans. Syst. Man Cybern. Syst.  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Menglin Ma, Baojiang Cui |
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle.  |
EIDWT  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Ziyang Chen, Baojiang Cui, Zishuai Cheng |
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model.  |
EIDWT  |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Huwaida T. Elshoush, Roua M. Mohammed, Mona T. Abdelhameed, Amel F. Mohammed |
Mitigating Man-in-the-middle Attack In Online Payment System Transaction Using Polymorphic AES Encryption Algorithm.  |
J. Inf. Hiding Multim. Signal Process.  |
2023 |
DBLP BibTeX RDF |
|
23 | D. Madhu, S. Vasuhi |
Lightweight Encryption Assisted Man-in-The-Middle Attack-Resilient Steganography Model for Secure Satellite Imagery Services: LEMARS.  |
J. Intell. Fuzzy Syst.  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule, Cosmas Ifeanyi Nwakanma |
Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms.  |
Future Internet  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Filippos Giannakas, Christos Troussas, Akrivi Krouska, Ioannis Voyiatzis, Cleo Sgouropoulou |
Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack.  |
Inf. Secur. J. A Glob. Perspect.  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Tengchao Ma, Changqiao Xu, Shujie Yang, Yiting Huang, Qingzhao An, Xiaohui Kuang, Luigi Alfredo Grieco |
A Mutation-Enabled Proactive Defense Against Service-Oriented Man-in-The-Middle Attack in Kubernetes.  |
IEEE Trans. Computers  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed, Ahmed Fakhfakh |
Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks.  |
Comput.  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Hamidreza Fereidouni, Olga Fadeitcheva, Mehdi Zalai |
IoT and Man-in-the-Middle Attacks.  |
CoRR  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha |
Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed.  |
CoRR  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Santosh Ganji, P. R. Kumar 0001 |
Seeing the Unseen: The REVEAL protocol to expose the wireless Man-in-the-Middle.  |
CoRR  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ebelechukwu Nwafor, Carter Schmidt, Habeeb Olufowobi |
IoT-MGSec: Mitigating Man-in-the-Middle Attacks in IoT Networks Using Graph-Based Learning.  |
ICMLA  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Hicham Amellal, Salma El Hajjami, Keshav Kaushik, Gunjan Chhabra, Suman Avdhesh Yadav |
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy.  |
IC3I  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Santosh Ganji, P. R. Kumar 0001 |
Seeing the Unseen: The REVEAL Protocol to Catch the Wireless Man-in-the-Middle.  |
S3@MobiCom  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Aabila Tharzeen, Balasubramaniam Natarajan, Babji Srinivasan |
Phasor data correction and transmission system state estimation under Man-in-the-Middle attack.  |
ISGT  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kichang Lee, Jonghyuk Yun, Jun Han 0001, JeongGil Ko |
Demo: Exploiting Indices for Man-in-the-Middle Attacks on Collaborative Unpooling Autoencoders.  |
MobiSys  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures.  |
ICCCSP  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Keiichiro Kimura, Yoshiaki Shiraishi, Masakatu Morii |
A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective.  |
candar  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha |
Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed.  |
AIIoT  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Marc Ruiz 0001, Jaume Comellas, Luis Velasco |
Man-in-the-Middle Attacks Through Re-Shaping I-Q Optical Constellations.  |
OFC  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ziran Gao, Mahesh S. Illindala, Jiankang Wang |
Intrusion Detection System with Updated Structure and Feature Selection Algorithm for Man-In- The-Middle Attacks in the Smart Grid.  |
IAS  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Xuewei Feng, Qi Li 0002, Kun Sun 0001, Yuxiang Yang, Ke Xu 0002 |
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.  |
SP  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Brett Piggott, Siddhant Patil, Guohuan Feng, Ibrahim Odat, Rajdeep Mukherjee, Balakrishnan Dharmalingam, Anyi Liu |
Net-GPT: A LLM-Empowered Man-in-the-Middle Chatbot for Unmanned Aerial Vehicle.  |
SEC  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Rishi Rani, Massimo Franceschetti |
Detection of Man-in-the-Middle Attacks in Model-Free Reinforcement Learning.  |
L4DC  |
2023 |
DBLP BibTeX RDF |
|
23 | Rahul Gothwal, Gaurav Dharmani, Ramnik Singh Reen, Eslam G. AbdAllah |
Evaluation of Man-in-the-Middle Attacks and Countermeasures on Autonomous Vehicles.  |
DSA  |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review.  |
Expert Syst. Appl.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sivasankari Nitiynandan, Somasundaram Kamalakkannan |
Detection and prevention of man-in-the-middle attack in iot network using regression modeling.  |
Adv. Eng. Softw.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Osman Salem, Khalid Alsubhi, Aymen Shaafi, Mostafa Gheryani, Ahmed Mehaoua, Raouf Boutaba |
Man-in-the-Middle Attack Mitigation in Internet of Medical Things.  |
IEEE Trans. Ind. Informatics  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mahmood A. Al Shareeda, Selvakumar Manickam |
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation.  |
Symmetry  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck |
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries.  |
IEEE Wirel. Commun. Lett.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Han Wu, Sareh Rowlands, Johan Wahlström |
Man-in-the-Middle Attack against Object Detection Systems.  |
CoRR  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review.  |
CoRR  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani |
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks.  |
IEEE Trans. Dependable Secur. Comput.  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Bruno Sousa, Tiago Cruz 0001, Vasco Pereira, Miguel Arieiro |
Denial of Service and Man in The Middle attacks in Programmable Logic Controllers.  |
|
2022 |
DOI RDF |
|
23 | N. Hemavathi |
Man-in-the-Middle Attack in Advanced Metering Infrastructure dataset.  |
|
2022 |
DOI RDF |
|
23 | Andre Büttner, Nils Gruschka |
Protecting FIDO Extensions Against Man-in-the-Middle Attacks.  |
ETAA  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mauro Conti, Eleonora Losiouk, Alessandro Visintin |
What you see is not what you get: a man-in-the-middle attack applied to video channels.  |
SAC  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Alessandra Alvarez Olazabal, Jasmeet Kaur, Abel Yeboah-Ofori |
Deploying Man-In-the-Middle Attack on IoT Devices Connected to Long Range Wide Area Networks (LoRaWAN).  |
ISC2  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Walter Tiberti, Eleonora Di Fina, Andrea Marotta, Dajana Cassioli |
Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface.  |
FNWF  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Seungyong Moon, Gaon An, Hyun Oh Song |
Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks.  |
AAAI  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Bhargavi Krishnamurthy, Sajjan G. Shiva |
Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach.  |
AIIoT  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Wenye Liu, Weiyang He, Bowen Hu, Chip-Hong Chang |
A Practical Man-in-the-Middle Attack on Deep Learning Edge Device by Sparse Light Strip Injection into Camera Data Lane.  |
SOCC  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Krittika Das, Rajdeep Basu, Raja Karmakar |
Man-In-The-Middle Attack Detection Using Ensemble Learning.  |
ICCCNT  |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Rolando Trujillo-Rasua |
Secure memory erasure in the presence of man-in-the-middle attackers.  |
J. Inf. Secur. Appl.  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Xiao-Guang Zhang, Guang-Hong Yang, Saud Wasly |
Man-in-the-middle attack against cyber-physical systems under random access protocol.  |
Inf. Sci.  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Haider Salim, Zhitang Li |
A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack.  |
IT Prof.  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yanjun Pan, Ziqi Xu, Ming Li 0003, Loukas Lazos |
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
23 | Muhammed Ali Yurdagul, Husrev Taha Sencar |
BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
23 | Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig |
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
23 | Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana E. Goulart, Katherine R. Davis 0001, Saman A. Zonouz |
Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
23 | Bruno Sousa, Tiago Cruz 0001, Miguel Arieiro, Vasco Pereira |
An ELEGANT dataset with Denial of Service and Man in The Middle attacks.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
23 | Seungyong Moon, Gaon An, Hyun Oh Song |
Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks.  |
CoRR  |
2021 |
DBLP BibTeX RDF |
|
23 | Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana E. Goulart, Katherine R. Davis 0001, Saman A. Zonouz |
Man-in-the-middle attacks and defence in a power system cyber-physical testbed.  |
IET Cyper-Phys. Syst.: Theory & Appl.  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Mladen Pavicic |
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?  |
Entropy  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Sajeda Akter, Sriram Chellappan, Tusher Chakraborty, Taslim Arefin Khan, Ashikur Rahman, A. B. M. Alim Al Islam |
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection.  |
IEEE Trans. Dependable Secur. Comput.  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang 0001 |
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.  |
IEEE Trans. Dependable Secur. Comput.  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yanjun Pan, Ziqi Xu, Ming Li 0003, Loukas Lazos |
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization.  |
MobiHoc  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Enkli Ylli, Julian Fejzaj |
Man in the Middle: Attack and Protection.  |
RTA-CSIT  |
2021 |
DBLP BibTeX RDF |
|
23 | Paul Griffioen, Raffaele Romagnoli, Bruce H. Krogh, Bruno Sinopoli |
Resilient Control in the Presence of Man-in-the-Middle Attacks.  |
ACC  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | T. J. OConnor, Dylan Jessee, Daniel Campos |
Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks.  |
CSET @ USENIX Security Symposium  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck |
Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks.  |
GLOBECOM  |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Benjamin Dowling, Britta Hale |
Secure Messaging Authentication against Active Man-in-the-Middle Attacks.  |
EuroS&P  |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 381 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|