The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase man-in-the-middle (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2003 (18) 2004-2005 (34) 2006 (24) 2007 (29) 2008 (37) 2009 (29) 2010-2011 (19) 2012-2013 (19) 2014-2015 (23) 2016-2017 (23) 2018 (19) 2019 (18) 2020 (18) 2021 (23) 2022 (18) 2023 (23) 2024 (7)
Publication types (Num. hits)
article(117) data(2) incollection(2) inproceedings(259) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 210 occurrences of 140 keywords

Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Ulrike Meyer, Susanne Wetzel A man-in-the-middle attack on UMTS. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, UMTS, mobile communication, GSM, man-in-the-middle attack
68Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. Search on Bibsonomy TRUST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle
68Xia Brustoloni, José Carlos Brustoloni Hardening Web browsers against man-in-the-middle and eavesdropping attacks. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack
63Mansoor Alicherry, Angelos D. Keromytis DoubleCheck: Multi-path verification against man-in-the-middle attacks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
63Khaled Ouafi, Raphael Overbeck, Serge Vaudenay On the Security of HB# against a Man-in-the-Middle Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HB, RFID, authentication protocols
63Ronald Cramer, Ivan Damgård Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
58Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 A Multipurpose Delegation Proxy for WWW Credentials. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle
58Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu A Note on the Cramer-Damgård Identification Scheme. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ?OR, Cryptography, identification scheme, man-in-the- middle attacks
49Dennis Kügler "Man in the Middle" Attacks on Bluetooth. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Dimitrios N. Serpanos, Richard J. Lipton Defense Against Man-in-the-Middle Attack in Client-Server Systems. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Senda Hammouda, Zouheir Trabelsi An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ARP cache poisoning attack, ARP protocol, man-in-the-middle attack
45Rolf Oppliger, Ralf Hauser, David A. Basin SSL/TLS Session-Aware User Authentication. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication
45Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks
45Claudio Soriente, Gene Tsudik, Ersin Uzun HAPADEP: Human-Assisted Pure Audio Device Pairing. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF User-Aided Security, Secure Device Pairing, Secure First Connect, Authentication Protocols, Man-in-the-Middle attacks
45José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
45Jinn-ke Jan, Yi-Hwa Chen A New Efficient MAKEP for Wireless Communications. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Wireless network, key distribution, Key exchange, Mutual authentication, Man-in-the-middle attack
36Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNS spoofing, MITM attacks, SIP, VoIP security
36Julien Bringer, Hervé Chabanne Trusted-HB: A Low-Cost Version of HB + Secure Against Man-in-the-Middle Attacks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jorge Belenguer, Carlos Miguel Tavares Calafate A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Michel Baud, Max Felser Profinet IO-Device Emulator based on the Man-in-the-middle Attack. Search on Bibsonomy ETFA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Rosario Gennaro Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36N. Asokan, Valtteri Niemi, Kaisa Nyberg Man-in-the-Middle in Tunnelled Authentication Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Ori Eisen Catching the fraudulent Man-in-the-Middle and Man-in-the-Browser. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Stephen Farrell Why Didn't We Spot That? Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security protocol development, practical security, SSL, TLS, man-in-the-middle
32Adonis P. H. Fung, K. W. Cheung 0003 SSLock: sustaining the trust on entities brought by SSL. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SSL trust management, domain naming convention, man-in-the-middle attacks
32Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF UMTS AKA, redirection attack, authentication, Man-in-the-middle attack
32Rafael Pass, Alon Rosen New and improved constructions of non-malleable cryptographic protocols. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle
27Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti Simulation-Based Concurrent Non-malleable Commitments and Decommitments. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Ghaith Hammouri, Berk Sunar PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HB+, tamper resilience, provable security, PUF
27Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema Vulnerabilities of UMTS Access Domain Security Architecture. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS
27Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Yuuki Takano, Naoki Isozaki, Yoichi Shinoda Multipath Key Exchange on P2P Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Yonghwan Lee, Eunmi Choi, Dugki Min An Authenticated Key Exchange Mechanism Using One-Time Shared Key. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman
23Akane Kosugi, Kaoru Teranishi, Kiminao Kogiso Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Muteeb Bin Muzammil, Muhammad Bilal 0006, Sahar Ajmal, Sandile Charles Shongwe, Yazeed Yasin Ghadi Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Dawei Sun, Inseok Hwang 0002, James Goppert A stealthy man-in-the-middle attack strategy for switched systems. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Yingwen Zhang, Zhaoxia Peng, Guoguang Wen, Jinhuan Wang, Tingwen Huang Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Menglin Ma, Baojiang Cui Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle. Search on Bibsonomy EIDWT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Ziyang Chen, Baojiang Cui, Zishuai Cheng 4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model. Search on Bibsonomy EIDWT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Huwaida T. Elshoush, Roua M. Mohammed, Mona T. Abdelhameed, Amel F. Mohammed Mitigating Man-in-the-middle Attack In Online Payment System Transaction Using Polymorphic AES Encryption Algorithm. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2023 DBLP  BibTeX  RDF
23D. Madhu, S. Vasuhi Lightweight Encryption Assisted Man-in-The-Middle Attack-Resilient Steganography Model for Secure Satellite Imagery Services: LEMARS. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule, Cosmas Ifeanyi Nwakanma Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Filippos Giannakas, Christos Troussas, Akrivi Krouska, Ioannis Voyiatzis, Cleo Sgouropoulou Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Tengchao Ma, Changqiao Xu, Shujie Yang, Yiting Huang, Qingzhao An, Xiaohui Kuang, Luigi Alfredo Grieco A Mutation-Enabled Proactive Defense Against Service-Oriented Man-in-The-Middle Attack in Kubernetes. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed, Ahmed Fakhfakh Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks. Search on Bibsonomy Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Hamidreza Fereidouni, Olga Fadeitcheva, Mehdi Zalai IoT and Man-in-the-Middle Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Santosh Ganji, P. R. Kumar 0001 Seeing the Unseen: The REVEAL protocol to expose the wireless Man-in-the-Middle. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Ebelechukwu Nwafor, Carter Schmidt, Habeeb Olufowobi IoT-MGSec: Mitigating Man-in-the-Middle Attacks in IoT Networks Using Graph-Based Learning. Search on Bibsonomy ICMLA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Hicham Amellal, Salma El Hajjami, Keshav Kaushik, Gunjan Chhabra, Suman Avdhesh Yadav Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Santosh Ganji, P. R. Kumar 0001 Seeing the Unseen: The REVEAL Protocol to Catch the Wireless Man-in-the-Middle. Search on Bibsonomy S3@MobiCom The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Aabila Tharzeen, Balasubramaniam Natarajan, Babji Srinivasan Phasor data correction and transmission system state estimation under Man-in-the-Middle attack. Search on Bibsonomy ISGT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Kichang Lee, Jonghyuk Yun, Jun Han 0001, JeongGil Ko Demo: Exploiting Indices for Man-in-the-Middle Attacks on Collaborative Unpooling Autoencoders. Search on Bibsonomy MobiSys The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures. Search on Bibsonomy ICCCSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Keiichiro Kimura, Yoshiaki Shiraishi, Masakatu Morii A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective. Search on Bibsonomy candar The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. Search on Bibsonomy AIIoT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Marc Ruiz 0001, Jaume Comellas, Luis Velasco Man-in-the-Middle Attacks Through Re-Shaping I-Q Optical Constellations. Search on Bibsonomy OFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Ziran Gao, Mahesh S. Illindala, Jiankang Wang Intrusion Detection System with Updated Structure and Feature Selection Algorithm for Man-In- The-Middle Attacks in the Smart Grid. Search on Bibsonomy IAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Xuewei Feng, Qi Li 0002, Kun Sun 0001, Yuxiang Yang, Ke Xu 0002 Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Brett Piggott, Siddhant Patil, Guohuan Feng, Ibrahim Odat, Rajdeep Mukherjee, Balakrishnan Dharmalingam, Anyi Liu Net-GPT: A LLM-Empowered Man-in-the-Middle Chatbot for Unmanned Aerial Vehicle. Search on Bibsonomy SEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Rishi Rani, Massimo Franceschetti Detection of Man-in-the-Middle Attacks in Model-Free Reinforcement Learning. Search on Bibsonomy L4DC The full citation details ... 2023 DBLP  BibTeX  RDF
23Rahul Gothwal, Gaurav Dharmani, Ramnik Singh Reen, Eslam G. AbdAllah Evaluation of Man-in-the-Middle Attacks and Countermeasures on Autonomous Vehicles. Search on Bibsonomy DSA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Sivasankari Nitiynandan, Somasundaram Kamalakkannan Detection and prevention of man-in-the-middle attack in iot network using regression modeling. Search on Bibsonomy Adv. Eng. Softw. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Osman Salem, Khalid Alsubhi, Aymen Shaafi, Mostafa Gheryani, Ahmed Mehaoua, Raouf Boutaba Man-in-the-Middle Attack Mitigation in Internet of Medical Things. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Mahmood A. Al Shareeda, Selvakumar Manickam Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Search on Bibsonomy Symmetry The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Han Wu, Sareh Rowlands, Johan Wahlström Man-in-the-Middle Attack against Object Detection Systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Bruno Sousa, Tiago Cruz 0001, Vasco Pereira, Miguel Arieiro Denial of Service and Man in The Middle attacks in Programmable Logic Controllers. Search on Bibsonomy 2022   DOI  RDF
23N. Hemavathi Man-in-the-Middle Attack in Advanced Metering Infrastructure dataset. Search on Bibsonomy 2022   DOI  RDF
23Andre Büttner, Nils Gruschka Protecting FIDO Extensions Against Man-in-the-Middle Attacks. Search on Bibsonomy ETAA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Mauro Conti, Eleonora Losiouk, Alessandro Visintin What you see is not what you get: a man-in-the-middle attack applied to video channels. Search on Bibsonomy SAC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Alessandra Alvarez Olazabal, Jasmeet Kaur, Abel Yeboah-Ofori Deploying Man-In-the-Middle Attack on IoT Devices Connected to Long Range Wide Area Networks (LoRaWAN). Search on Bibsonomy ISC2 The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Walter Tiberti, Eleonora Di Fina, Andrea Marotta, Dajana Cassioli Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface. Search on Bibsonomy FNWF The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Seungyong Moon, Gaon An, Hyun Oh Song Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks. Search on Bibsonomy AAAI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Bhargavi Krishnamurthy, Sajjan G. Shiva Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach. Search on Bibsonomy AIIoT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Wenye Liu, Weiyang He, Bowen Hu, Chip-Hong Chang A Practical Man-in-the-Middle Attack on Deep Learning Edge Device by Sparse Light Strip Injection into Camera Data Lane. Search on Bibsonomy SOCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Krittika Das, Rajdeep Basu, Raja Karmakar Man-In-The-Middle Attack Detection Using Ensemble Learning. Search on Bibsonomy ICCCNT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Rolando Trujillo-Rasua Secure memory erasure in the presence of man-in-the-middle attackers. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Xiao-Guang Zhang, Guang-Hong Yang, Saud Wasly Man-in-the-middle attack against cyber-physical systems under random access protocol. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Haider Salim, Zhitang Li A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack. Search on Bibsonomy IT Prof. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Yanjun Pan, Ziqi Xu, Ming Li 0003, Loukas Lazos Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Muhammed Ali Yurdagul, Husrev Taha Sencar BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana E. Goulart, Katherine R. Davis 0001, Saman A. Zonouz Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Bruno Sousa, Tiago Cruz 0001, Miguel Arieiro, Vasco Pereira An ELEGANT dataset with Denial of Service and Man in The Middle attacks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Seungyong Moon, Gaon An, Hyun Oh Song Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana E. Goulart, Katherine R. Davis 0001, Saman A. Zonouz Man-in-the-middle attacks and defence in a power system cyber-physical testbed. Search on Bibsonomy IET Cyper-Phys. Syst.: Theory & Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Mladen Pavicic How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Search on Bibsonomy Entropy The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Sajeda Akter, Sriram Chellappan, Tusher Chakraborty, Taslim Arefin Khan, Ashikur Rahman, A. B. M. Alim Al Islam Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang 0001 Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Yanjun Pan, Ziqi Xu, Ming Li 0003, Loukas Lazos Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. Search on Bibsonomy MobiHoc The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Enkli Ylli, Julian Fejzaj Man in the Middle: Attack and Protection. Search on Bibsonomy RTA-CSIT The full citation details ... 2021 DBLP  BibTeX  RDF
23Paul Griffioen, Raffaele Romagnoli, Bruce H. Krogh, Bruno Sinopoli Resilient Control in the Presence of Man-in-the-Middle Attacks. Search on Bibsonomy ACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23T. J. OConnor, Dylan Jessee, Daniel Campos Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks. Search on Bibsonomy CSET @ USENIX Security Symposium The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks. Search on Bibsonomy GLOBECOM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Benjamin Dowling, Britta Hale Secure Messaging Authentication against Active Man-in-the-Middle Attacks. Search on Bibsonomy EuroS&P The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 381 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license