Results 141 to 150 of about 308,714 (183)
Some of the next articles are maybe not open access.
“Man in the Middle” Attacks on Bluetooth
2003Bluetooth is a short range wireless communication technology that has been designed to eliminate wires between both stationary and mobile devices. As wireless communication is much more vulnerable to attacks, Bluetooth provides authentication and encryption on the link level.
openaire +1 more source
Man-in-the-middle attack against cyber-physical systems under random access protocol
Information Sciences, 2021Guang-Hong Yang
exaly
U.S. Combatant Commander: The Man in the Middle
2004Chapters 2–7 in this book have explored the issue Dana Priest raised in her much-discussed series of articles published in The Washington Post in 2000. These chapters bring further study, more recent and more complete case-study evidence, and much more historical and political context to her insightful and original observations about the role combatant
openaire +1 more source
Secure remote state estimation against linear man-in-the-middle attacks using watermarking
Automatica, 2020Jiahao Huang, Fangfei Li, Wen Yang
exaly
Man-in-the-Middle Attack Mitigation in Internet of Medical Things
IEEE Transactions on Industrial Informatics, 2022Osman Salem +2 more
exaly

