共 50 条
- [1] Defending Against Man-In-The-Middle Attack in Repeated Games PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748
- [2] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295
- [3] Wireless intrusion detection and response - A case study using the classic man-in-the-middle attack 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 883 - 888
- [4] Modeling of Man-in-the-Middle Attack in the Wireless Networks 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
- [6] A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2017), PT II, 2017, 10192 : 14 - 22
- [7] On the Security of HB# against a Man-in-the-Middle Attack ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
- [8] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
- [9] Block Link Flooding Algorithm for TCP SYN Flooding Attack INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 895 - 905
- [10] Optimal Man-In-The-Middle Stealth Attack CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59