共 50 条
- [21] WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1464 - 1470
- [23] A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 275 - 280
- [25] Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States” International Journal of Theoretical Physics, 2013, 52 : 3199 - 3203
- [26] Profinet IO-device emulator based on the man-in-the-middle attack 2006 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION, VOLS 1 -3, 2006, : 1199 - +
- [27] BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 214 - 220
- [28] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295