共 50 条
- [1] Optimal Man-In-The-Middle Stealth Attack CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
- [2] Modeling of Man-in-the-Middle Attack in the Wireless Networks 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
- [3] WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1464 - 1470
- [4] Wireless intrusion detection and response - A case study using the classic man-in-the-middle attack 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 883 - 888
- [5] Man-in-the-Middle Attack in HTTP/2 PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
- [8] Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN EURASIP Journal on Wireless Communications and Networking, 2012
- [9] BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 214 - 220
- [10] Analysis of Traffic Signals on an SDN for Detection and Classification of a Man-in-the-Middle Attack 2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,