共 50 条
- [41] Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence 2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
- [42] Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 491 - 495
- [43] Wireless intrusion detection and response - A case study using the classic man-in-the-middle attack 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 883 - 888
- [45] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
- [46] Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 1 - 8