|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 210 occurrences of 140 keywords
|
|
|
Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Ulrike Meyer, Susanne Wetzel |
A man-in-the-middle attack on UMTS. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
authentication, UMTS, mobile communication, GSM, man-in-the-middle attack |
68 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
68 | Xia Brustoloni, José Carlos Brustoloni |
Hardening Web browsers against man-in-the-middle and eavesdropping attacks. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack |
63 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
63 | Khaled Ouafi, Raphael Overbeck, Serge Vaudenay |
On the Security of HB# against a Man-in-the-Middle Attack. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
HB, RFID, authentication protocols |
63 | Ronald Cramer, Ivan Damgård |
Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
58 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
58 | Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu |
A Note on the Cramer-Damgård Identification Scheme. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
?OR, Cryptography, identification scheme, man-in-the- middle attacks |
49 | Dennis Kügler |
"Man in the Middle" Attacks on Bluetooth. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Dimitrios N. Serpanos, Richard J. Lipton |
Defense Against Man-in-the-Middle Attack in Client-Server Systems. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Senda Hammouda, Zouheir Trabelsi |
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
ARP cache poisoning attack, ARP protocol, man-in-the-middle attack |
45 | Rolf Oppliger, Ralf Hauser, David A. Basin |
SSL/TLS Session-Aware User Authentication. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
man-in-the-middle (MITM) attacks, SSL/TLS protocols, security, user authentication |
45 | Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno |
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks |
45 | Claudio Soriente, Gene Tsudik, Ersin Uzun |
HAPADEP: Human-Assisted Pure Audio Device Pairing. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
User-Aided Security, Secure Device Pairing, Secure First Connect, Authentication Protocols, Man-in-the-Middle attacks |
45 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. |
ACM J. Educ. Resour. Comput. |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
45 | Jinn-ke Jan, Yi-Hwa Chen |
A New Efficient MAKEP for Wireless Communications. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
Wireless network, key distribution, Key exchange, Mutual authentication, Man-in-the-middle attack |
36 | Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
DNS spoofing, MITM attacks, SIP, VoIP security |
36 | Julien Bringer, Hervé Chabanne |
Trusted-HB: A Low-Cost Version of HB + Secure Against Man-in-the-Middle Attacks. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jorge Belenguer, Carlos Miguel Tavares Calafate |
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Michel Baud, Max Felser |
Profinet IO-Device Emulator based on the Man-in-the-middle Attack. |
ETFA |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Rosario Gennaro |
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
36 | N. Asokan, Valtteri Niemi, Kaisa Nyberg |
Man-in-the-Middle in Tunnelled Authentication Protocols. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Ori Eisen |
Catching the fraudulent Man-in-the-Middle and Man-in-the-Browser. |
Netw. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Stephen Farrell |
Why Didn't We Spot That? |
IEEE Internet Comput. |
2010 |
DBLP DOI BibTeX RDF |
security protocol development, practical security, SSL, TLS, man-in-the-middle |
32 | Adonis P. H. Fung, K. W. Cheung 0003 |
SSLock: sustaining the trust on entities brought by SSL. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
SSL trust management, domain naming convention, man-in-the-middle attacks |
32 | Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin |
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
UMTS AKA, redirection attack, authentication, Man-in-the-middle attack |
32 | Rafael Pass, Alon Rosen |
New and improved constructions of non-malleable cryptographic protocols. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle |
27 | Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
Simulation-Based Concurrent Non-malleable Commitments and Decommitments. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Ghaith Hammouri, Berk Sunar |
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
HB+, tamper resilience, provable security, PUF |
27 | Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
Vulnerabilities of UMTS Access Domain Security Architecture. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS |
27 | Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel |
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Yuuki Takano, Naoki Isozaki, Yoichi Shinoda |
Multipath Key Exchange on P2P Networks. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
23 | Akane Kosugi, Kaoru Teranishi, Kiminao Kogiso |
Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Muteeb Bin Muzammil, Muhammad Bilal 0006, Sahar Ajmal, Sandile Charles Shongwe, Yazeed Yasin Ghadi |
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Dawei Sun, Inseok Hwang 0002, James Goppert |
A stealthy man-in-the-middle attack strategy for switched systems. |
Int. J. Syst. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Yingwen Zhang, Zhaoxia Peng, Guoguang Wen, Jinhuan Wang, Tingwen Huang |
Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation. |
IEEE Trans. Syst. Man Cybern. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Menglin Ma, Baojiang Cui |
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle. |
EIDWT |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Ziyang Chen, Baojiang Cui, Zishuai Cheng |
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model. |
EIDWT |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Huwaida T. Elshoush, Roua M. Mohammed, Mona T. Abdelhameed, Amel F. Mohammed |
Mitigating Man-in-the-middle Attack In Online Payment System Transaction Using Polymorphic AES Encryption Algorithm. |
J. Inf. Hiding Multim. Signal Process. |
2023 |
DBLP BibTeX RDF |
|
23 | D. Madhu, S. Vasuhi |
Lightweight Encryption Assisted Man-in-The-Middle Attack-Resilient Steganography Model for Secure Satellite Imagery Services: LEMARS. |
J. Intell. Fuzzy Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule, Cosmas Ifeanyi Nwakanma |
Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms. |
Future Internet |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Filippos Giannakas, Christos Troussas, Akrivi Krouska, Ioannis Voyiatzis, Cleo Sgouropoulou |
Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack. |
Inf. Secur. J. A Glob. Perspect. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Tengchao Ma, Changqiao Xu, Shujie Yang, Yiting Huang, Qingzhao An, Xiaohui Kuang, Luigi Alfredo Grieco |
A Mutation-Enabled Proactive Defense Against Service-Oriented Man-in-The-Middle Attack in Kubernetes. |
IEEE Trans. Computers |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed, Ahmed Fakhfakh |
Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks. |
Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Hamidreza Fereidouni, Olga Fadeitcheva, Mehdi Zalai |
IoT and Man-in-the-Middle Attacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha |
Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Santosh Ganji, P. R. Kumar 0001 |
Seeing the Unseen: The REVEAL protocol to expose the wireless Man-in-the-Middle. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ebelechukwu Nwafor, Carter Schmidt, Habeeb Olufowobi |
IoT-MGSec: Mitigating Man-in-the-Middle Attacks in IoT Networks Using Graph-Based Learning. |
ICMLA |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Hicham Amellal, Salma El Hajjami, Keshav Kaushik, Gunjan Chhabra, Suman Avdhesh Yadav |
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy. |
IC3I |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Santosh Ganji, P. R. Kumar 0001 |
Seeing the Unseen: The REVEAL Protocol to Catch the Wireless Man-in-the-Middle. |
S3@MobiCom |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Aabila Tharzeen, Balasubramaniam Natarajan, Babji Srinivasan |
Phasor data correction and transmission system state estimation under Man-in-the-Middle attack. |
ISGT |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kichang Lee, Jonghyuk Yun, Jun Han 0001, JeongGil Ko |
Demo: Exploiting Indices for Man-in-the-Middle Attacks on Collaborative Unpooling Autoencoders. |
MobiSys |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures. |
ICCCSP |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Keiichiro Kimura, Yoshiaki Shiraishi, Masakatu Morii |
A New Approach to Disabling SSL/TLS: Man-in-the-Middle Attacks are still Effective. |
candar |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha |
Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. |
AIIoT |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Marc Ruiz 0001, Jaume Comellas, Luis Velasco |
Man-in-the-Middle Attacks Through Re-Shaping I-Q Optical Constellations. |
OFC |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Ziran Gao, Mahesh S. Illindala, Jiankang Wang |
Intrusion Detection System with Updated Structure and Feature Selection Algorithm for Man-In- The-Middle Attacks in the Smart Grid. |
IAS |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Xuewei Feng, Qi Li 0002, Kun Sun 0001, Yuxiang Yang, Ke Xu 0002 |
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. |
SP |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Brett Piggott, Siddhant Patil, Guohuan Feng, Ibrahim Odat, Rajdeep Mukherjee, Balakrishnan Dharmalingam, Anyi Liu |
Net-GPT: A LLM-Empowered Man-in-the-Middle Chatbot for Unmanned Aerial Vehicle. |
SEC |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Rishi Rani, Massimo Franceschetti |
Detection of Man-in-the-Middle Attacks in Model-Free Reinforcement Learning. |
L4DC |
2023 |
DBLP BibTeX RDF |
|
23 | Rahul Gothwal, Gaurav Dharmani, Ramnik Singh Reen, Eslam G. AbdAllah |
Evaluation of Man-in-the-Middle Attacks and Countermeasures on Autonomous Vehicles. |
DSA |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review. |
Expert Syst. Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sivasankari Nitiynandan, Somasundaram Kamalakkannan |
Detection and prevention of man-in-the-middle attack in iot network using regression modeling. |
Adv. Eng. Softw. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Osman Salem, Khalid Alsubhi, Aymen Shaafi, Mostafa Gheryani, Ahmed Mehaoua, Raouf Boutaba |
Man-in-the-Middle Attack Mitigation in Internet of Medical Things. |
IEEE Trans. Ind. Informatics |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mahmood A. Al Shareeda, Selvakumar Manickam |
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. |
Symmetry |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck |
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries. |
IEEE Wirel. Commun. Lett. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Han Wu, Sareh Rowlands, Johan Wahlström |
Man-in-the-Middle Attack against Object Detection Systems. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues |
Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani |
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks. |
IEEE Trans. Dependable Secur. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Bruno Sousa, Tiago Cruz 0001, Vasco Pereira, Miguel Arieiro |
Denial of Service and Man in The Middle attacks in Programmable Logic Controllers. |
|
2022 |
DOI RDF |
|
23 | N. Hemavathi |
Man-in-the-Middle Attack in Advanced Metering Infrastructure dataset. |
|
2022 |
DOI RDF |
|
23 | Andre Büttner, Nils Gruschka |
Protecting FIDO Extensions Against Man-in-the-Middle Attacks. |
ETAA |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Mauro Conti, Eleonora Losiouk, Alessandro Visintin |
What you see is not what you get: a man-in-the-middle attack applied to video channels. |
SAC |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Alessandra Alvarez Olazabal, Jasmeet Kaur, Abel Yeboah-Ofori |
Deploying Man-In-the-Middle Attack on IoT Devices Connected to Long Range Wide Area Networks (LoRaWAN). |
ISC2 |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Walter Tiberti, Eleonora Di Fina, Andrea Marotta, Dajana Cassioli |
Impact of Man-in-the-Middle Attacks to the O-RAN Inter-Controllers Interface. |
FNWF |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Seungyong Moon, Gaon An, Hyun Oh Song |
Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks. |
AAAI |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Bhargavi Krishnamurthy, Sajjan G. Shiva |
Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach. |
AIIoT |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Wenye Liu, Weiyang He, Bowen Hu, Chip-Hong Chang |
A Practical Man-in-the-Middle Attack on Deep Learning Edge Device by Sparse Light Strip Injection into Camera Data Lane. |
SOCC |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Krittika Das, Rajdeep Basu, Raja Karmakar |
Man-In-The-Middle Attack Detection Using Ensemble Learning. |
ICCCNT |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Rolando Trujillo-Rasua |
Secure memory erasure in the presence of man-in-the-middle attackers. |
J. Inf. Secur. Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Xiao-Guang Zhang, Guang-Hong Yang, Saud Wasly |
Man-in-the-middle attack against cyber-physical systems under random access protocol. |
Inf. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Haider Salim, Zhitang Li |
A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack. |
IT Prof. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yanjun Pan, Ziqi Xu, Ming Li 0003, Loukas Lazos |
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
23 | Muhammed Ali Yurdagul, Husrev Taha Sencar |
BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
23 | Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig |
Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
23 | Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana E. Goulart, Katherine R. Davis 0001, Saman A. Zonouz |
Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
23 | Bruno Sousa, Tiago Cruz 0001, Miguel Arieiro, Vasco Pereira |
An ELEGANT dataset with Denial of Service and Man in The Middle attacks. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
23 | Seungyong Moon, Gaon An, Hyun Oh Song |
Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
23 | Patrick Wlazlo, Abhijeet Sahu, Zeyu Mao, Hao Huang, Ana E. Goulart, Katherine R. Davis 0001, Saman A. Zonouz |
Man-in-the-middle attacks and defence in a power system cyber-physical testbed. |
IET Cyper-Phys. Syst.: Theory & Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Mladen Pavicic |
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? |
Entropy |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Sajeda Akter, Sriram Chellappan, Tusher Chakraborty, Taslim Arefin Khan, Ashikur Rahman, A. B. M. Alim Al Islam |
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection. |
IEEE Trans. Dependable Secur. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang 0001 |
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. |
IEEE Trans. Dependable Secur. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yanjun Pan, Ziqi Xu, Ming Li 0003, Loukas Lazos |
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. |
MobiHoc |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Enkli Ylli, Julian Fejzaj |
Man in the Middle: Attack and Protection. |
RTA-CSIT |
2021 |
DBLP BibTeX RDF |
|
23 | Paul Griffioen, Raffaele Romagnoli, Bruce H. Krogh, Bruno Sinopoli |
Resilient Control in the Presence of Man-in-the-Middle Attacks. |
ACC |
2021 |
DBLP DOI BibTeX RDF |
|
23 | T. J. OConnor, Dylan Jessee, Daniel Campos |
Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks. |
CSET @ USENIX Security Symposium |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck |
Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks. |
GLOBECOM |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Benjamin Dowling, Britta Hale |
Secure Messaging Authentication against Active Man-in-the-Middle Attacks. |
EuroS&P |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 381 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|