共 50 条
- [1] Optimal Man-In-The-Middle Stealth Attack CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
- [3] Man-in-the-Middle (MITM) Attack Based Hijacking of HTTP Traffic Using Open Source Tools 2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2018, : 438 - 443
- [4] Modeling of Man-in-the-Middle Attack in the Wireless Networks 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
- [5] On the Security of HB# against a Man-in-the-Middle Attack ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
- [6] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295
- [9] Defending Against Man-In-The-Middle Attack in Repeated Games PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748
- [10] Man-in-the-middle attack on quantum secure communications with authentication Quantum Information Processing, 2014, 13 : 917 - 923