Results 161 to 170 of about 640,321 (187)
Some of the next articles are maybe not open access.
Man-in-the-Middle (MitM) Attacks: Techniques and defenses
World Journal of Advanced Engineering Technology and SciencesMitM attacks pose a significant risk when unauthorized third parties grab and control the exchanged communications between different parties unnoticed. It describes the main ways a MitM attack can take place, and why knowing about passive and active approaches are crucial.
openaire +1 more source
Protecting FIDO Extensions Against Man-in-the-Middle Attacks
2023Andre Büttner, Nils Gruschka
openaire +1 more source
Detection and prevention of man-in-the-middle attack in iot network using regression modeling
Advances in Engineering Software, 2022exaly
Man-in-the-middle attacks on auto-updating software
Bell Labs Technical Journal, 2007Bjoern M. Luettmann, Adam C. Bender
openaire +1 more source
Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review
Expert Systems With Applications, 2022exaly
Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures
IEEE Transactions on Wireless Communications, 2010Keijo Haataja, Pekka Toivanen
exaly

