Results 61 to 70 of about 409,625 (195)

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]

open access: yes, 2016
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah   +4 more
core   +1 more source

Man in the middle attack on HTTPS protocol

open access: yesScientific Bulletin of Naval Academy, 2020
A "man-in-the-middle" (MITM) attack occurs when an external entity intercepts communication between two systems. This can happen for any form of online communication, such as e-mail, websites social networking and web browsing. Not only does it try to listen to your private conversations, but it also steals all the information from your devices.
openaire   +1 more source

Man in the Middle Attacks: Analysis, Motivation and Prevention

open access: yesInternational Journal of Computer Networks and Communications Security, 2020
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it.
Danish Javeed, Umar MohammedBadamasi
openaire   +1 more source

SoK: A Reality Check for DNP3 Attacks 15 Years Later

open access: yesSmart Cities
OT (operational technology) protocols such as DNP3/TCP, commonly used in the electrical utility sector, have become a focal point for security researchers.
Juan David Parra Rodriguez   +5 more
doaj   +1 more source

On the security of SSL/TLS-enabled applications

open access: yesApplied Computing and Informatics, 2014
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality.
Manik Lal Das, Navkar Samdaria
doaj   +1 more source

Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme [PDF]

open access: yes, 2016
Telecare Medicine Information Systems (TMIS) provides flexible and convenient e-health care. However the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and ...
Tang, Shanyu   +2 more
core   +1 more source

Lightweight Anomaly-Based Detection Using Cuckoo Search Algorithm and Decision Tree to Mitigate Man-in-the-Middle Attacks in DNS

open access: yesApplied Sciences
As technology advances, the services provided by domain servers require new innovative techniques that can be optimized for frequent changes. Man-in-the-Middle (MitM) attacks on Domain Name Servers (DNS) pose a security threat, enabling attackers to ...
Ramahlapane Lerato Moila   +1 more
doaj   +1 more source

A Fault Analytic Method against HB+ [PDF]

open access: yes, 2010
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family.
Carrijo, Jose   +2 more
core   +2 more sources

Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing

open access: yesApplied Sciences, 2020
With the development of vehicular ad-hoc networks (VANETs) and Internet of vehicles (IoVs), a large amount of useful information is generated for vehicle drivers and traffic management systems. The amount of vehicle and traffic information is as large as
JoonYoung Lee   +5 more
doaj   +1 more source

Compte-rendu de la 5ème réunion du comité de coordination et de l'atelier "jachère et systèmes agraires" [PDF]

open access: yes, 1998
When making new software systems, security testing should always be included in the process. In this thesis, attacks were identified and performed against a system consisting of two servers and an Android application.
Gyulai, Sofia, Holmgren, William
core  

Home - About - Disclaimer - Privacy