共 50 条
- [31] Self-Confirming Equilibrium and Model Uncertainty AMERICAN ECONOMIC REVIEW, 2015, 105 (02): : 646 - 677
- [32] Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (03): : 131 - 134
- [33] Research on User Authentication Scheme against the Man-in-the-Middle Attack INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
- [34] Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 263 - +
- [35] Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network 2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,
- [36] Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence 2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
- [37] Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 491 - 495
- [40] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599