Results 121 to 130 of about 308,714 (183)

A Survey of Man In The Middle Attacks

IEEE Communications Surveys and Tutorials, 2016
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself.
Mauro Conti, Nicola Dragoni
exaly   +2 more sources

MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles [PDF]

open access: yesIEEE Internet of Things Journal, 2020
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Farhan Ahmad   +2 more
exaly   +5 more sources

Man in the Middle

Science, 2013
Scrutinized by opposing sides—wolf-watchers and wolf-hunters—Yellowstone National Park wolf expert Douglas Smith tries to stick with science.
openaire   +1 more source

Man in the Middle - Hacker's Playground

International Journal for Electronic Crime Investigation, 2020
AbstractThere has been an increase in potential sources of threats to the security of information systems and dataof governments, companies and individuals in the present day, due to the growing number ofinformation systems types and devices, the expanding availability of freely-downloadable open sourcetools, the degree of interconnectivity made ...
Shariq Malik Malik   +1 more
openaire   +1 more source

Man in the Middle

International Studies in Philosophy, 2002
S'interrogeant sur le sens des chapitres doubles dans «Par dela le Bien et le Mal», l'A. montre que l'effet structurel provoque par le changement de numerotation (296 au lieu de 299) devoile une problematique anthropocentrique concernant la difference homme/femme. Examinant la place de l'homme au centre du monde, l'A.
openaire   +1 more source

Home - About - Disclaimer - Privacy