Results 131 to 140 of about 3,560 (200)
Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis. [PDF]
Wang G, Gu Y.
europepmc +1 more source
A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System. [PDF]
Huda S +4 more
europepmc +1 more source
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications. [PDF]
Sen MA, Al-Rubaye S, Tsourdos A.
europepmc +1 more source
Enhancing Syslog Message Security and Reliability over Unidirectional Fiber Optics. [PDF]
Anton AA +3 more
europepmc +1 more source
Demonstration of enhanced long-range cosmic time synchronization for wireless and secure dissemination of standard time. [PDF]
Tanaka HKM.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
ARP Spoofing Analysis and Prevention
2020 5th International Conference on Smart Grid and Electrical Automation (ICSGEA), 2020ARP spoofing allows an attacker to eavesdrop on communications between other nodes, modify the contents of packets, and hijack communications. Here the causes of ARP spoofing are discussed and analyzed in detail. A new mechanism is introduced to prevent ARP spoofing attacks while overcoming the limitations of traditional methods.
Yongjian Zhao, Rui Guo, Peixin Lv
openaire +1 more source
2009 Information Security Curriculum Development Conference, 2009
ARP spoofing attack, one of the most important security topics, is usually taught in courses such as Intrusion Detection in Local Area Networks (LANs). In such a course, hands-on labs are very important as they facilitate students' learning on how to detect ARP spoofing using various types of security solutions, such as intrusion detection and ...
Zouheir Trabelsi, Wassim El-Hajj
openaire +1 more source
ARP spoofing attack, one of the most important security topics, is usually taught in courses such as Intrusion Detection in Local Area Networks (LANs). In such a course, hands-on labs are very important as they facilitate students' learning on how to detect ARP spoofing using various types of security solutions, such as intrusion detection and ...
Zouheir Trabelsi, Wassim El-Hajj
openaire +1 more source

