共 50 条
- [41] Defense against man-in-the-middle attack in client-server systems PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 9 - 14
- [42] Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States” International Journal of Theoretical Physics, 2013, 52 : 3199 - 3203
- [44] Profinet IO-device emulator based on the man-in-the-middle attack 2006 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION, VOLS 1 -3, 2006, : 1199 - +
- [45] BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 214 - 220
- [47] Quantum man-in-the-middle attack on the calibration process of quantum key distribution Scientific Reports, 8
- [49] Applying Authentication Tests to Discover Man-in-the-Middle Attack in Security Protocols 2013 EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2013, : 35 - 40
- [50] Analysis of Traffic Signals on an SDN for Detection and Classification of a Man-in-the-Middle Attack 2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,