-
1دورية أكاديمية
المؤلفون: Akane Kosugi, Kaoru Teranishi, Kiminao Kogiso
المصدر: IEEE Access, Vol 12, Pp 10535-10547 (2024)
مصطلحات موضوعية: Encrypted control, man-in-the-middle attack, attack detection, experimental validation, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2دورية أكاديمية
المصدر: IEEE Access, Vol 12, Pp 6365-6375 (2024)
مصطلحات موضوعية: Privacy, Man-In-The-Middle attack, session hijacking, hypertext transfer protocol (HTTP) hijacking, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
3رسالة جامعية
المؤلفون: Agborubere, Belema
مصطلحات موضوعية: smart monitoring system, continuous status monitoring, SDN, TLS, OpenFlow, Man-in-the-Middle attack (MitM), network security
-
4دورية أكاديمية
المؤلفون: Md Nizam Udin, Farah Azaliney Mohd Amin, Nor Ainaa Mat Abu, Siti Nurfazliana Mohamad Sarif, Intan Nur Athirah Binti Mohammad Zuki
المصدر: Malaysian Journal of Computing, Vol 7, Iss 2, Pp 1139-1149 (2022)
مصطلحات موضوعية: lamport digital signature scheme, station to station protocol, diffie-hellman key exchange, man in the middle attack and one-way function, public key cryptography, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
العلاقة: https://mjoc.uitm.edu.my/main/images/journal/vol7-2-2022/6_Md_Nizam_Udin_et_al.pdfTest; https://doaj.org/toc/2600-8238Test
-
5مؤتمر
مصطلحات موضوعية: Blended Ensemble, Intelligent control systems, Man-in-the-middle attack, Smart grid
العلاقة: 33rd Australasian Universities Power Engineering Conference, AUPEC 2023, Ballarat, 25-27 September 2023, 2023 33rd Australasian Universities Power Engineering Conference, AUPEC 2023; http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/201142Test; vital:19505; https://doi.org/10.1109/AUPEC59354.2023.10502977Test
الإتاحة: https://doi.org/10.1109/AUPEC59354.2023.10502977Test
http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/201142Test -
6دورية أكاديمية
المؤلفون: Philipp Schmid, Alisa Schaffhäuser, Rasha Kashef
المصدر: Information, Vol 14, Iss 8, p 437 (2023)
مصطلحات موضوعية: blockchain, IoT, PLC, hashing, man-in-the-middle attack, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
7دورية أكاديمية
المؤلفون: Soumya Mudgal, Saurabh Pranjale, Tharun Balaji, Syed Aamir Ahmed Ahmed, Neeraj Kumar Singh, Praveen Kumar Gupta, Vasundhara Mahajan
المصدر: U.Porto Journal of Engineering, Vol 8, Iss 2, Pp 51-64 (2022)
مصطلحات موضوعية: denial of service attack, man in the middle attack, false data injection, cyber-protection, cryptography data security, Engineering (General). Civil engineering (General), TA1-2040, Technology (General), T1-995
وصف الملف: electronic resource
العلاقة: https://journalengineering.fe.up.pt/index.php/upjeng/article/view/1033Test; https://doaj.org/toc/2183-6493Test
-
8دورية أكاديمية
المؤلفون: Jawad Hussain, Talib, Irsa
المصدر: Journal of Computing and Artificial Intelligence ; Vol. 1 No. 2 (2023): Volume 1 Issue 2 (2023) ; 3007-3057 ; 3007-3049
مصطلحات موضوعية: Man in the middle attack, MITM attack, Cyber-attacks, Cyber Security, Common attacks, Cyber Threats
وصف الملف: application/pdf
-
9دورية أكاديمية
المؤلفون: Thakwan A. Jawad, Awan Nahel Mahmood, Abdulhameed N. Hameed
المصدر: Detecting man-in-the-middle attacks via hybrid quantumclassical protocol in software-defined networks 31(1) 205-211
مصطلحات موضوعية: BB84 protocol, Diffie-Hellman, Man-in-the-middle attack, Quantum key distribution, Software-defined networking
العلاقة: https://zenodo.org/record/8128820Test; https://doi.org/10.11591/ijeecs.v31.i1.pp205-211Test; oai:zenodo.org:8128820
-
10دورية أكاديمية
المصدر: International Journal of Interactive Mobile Technologies (iJIM); Vol. 17 No. 10 (2023); pp. 193-211 ; 1865-7923
مصطلحات موضوعية: Man-in-the-middle attack (MITM), Elliptic Curve Cryptography (ECC), Advanced Encryption System (AES), National Institute of Standards and Technology (NIST)
وصف الملف: application/pdf