Results 61 to 70 of about 409,625 (195)
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah +4 more
core +1 more source
Man in the middle attack on HTTPS protocol
A "man-in-the-middle" (MITM) attack occurs when an external entity intercepts communication between two systems. This can happen for any form of online communication, such as e-mail, websites social networking and web browsing. Not only does it try to listen to your private conversations, but it also steals all the information from your devices.
openaire +1 more source
Man in the Middle Attacks: Analysis, Motivation and Prevention
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it.
Danish Javeed, Umar MohammedBadamasi
openaire +1 more source
SoK: A Reality Check for DNP3 Attacks 15 Years Later
OT (operational technology) protocols such as DNP3/TCP, commonly used in the electrical utility sector, have become a focal point for security researchers.
Juan David Parra Rodriguez +5 more
doaj +1 more source
On the security of SSL/TLS-enabled applications
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality.
Manik Lal Das, Navkar Samdaria
doaj +1 more source
Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme [PDF]
Telecare Medicine Information Systems (TMIS) provides flexible and convenient e-health care. However the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and ...
Tang, Shanyu +2 more
core +1 more source
As technology advances, the services provided by domain servers require new innovative techniques that can be optimized for frequent changes. Man-in-the-Middle (MitM) attacks on Domain Name Servers (DNS) pose a security threat, enabling attackers to ...
Ramahlapane Lerato Moila +1 more
doaj +1 more source
A Fault Analytic Method against HB+ [PDF]
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family.
Carrijo, Jose +2 more
core +2 more sources
With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as large as
JoonYoung Lee +5 more
doaj +1 more source
Compte-rendu de la 5ème réunion du comité de coordination et de l'atelier "jachère et systèmes agraires" [PDF]
When making new software systems, security testing should always be included in the process. In this thesis, attacks were identified and performed against a system consisting of two servers and an Android application.
Gyulai, Sofia, Holmgren, William
core

