Results 81 to 90 of about 409,625 (195)
Cyber-security becomes more and more important as the technology moves forward. Having knowledge about the technologies of the modern world is crucial and helps to make a better and safer environment. This study identifies and demonstrates some of the methods which are used to exploit two or potentially more hosts in a network. Exploiting weaknesses in
openaire +1 more source
For the implementation of the Master’s program “Business Continuity and Information Security Maintenance” in the field of specialty 10.04.01 “Information Security”, a software shell of the educational laboratory complex (ELC) designed to study the “Man ...
Alexander B. Sattarov +1 more
doaj +1 more source
Network security attacks. ARP Poisoning case study [PDF]
Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic.
Luminiţa DEFTA
core
The claims made in a manifesto resulting in the European quantum technologies flagship initiative in quantum technology and similar enterprises are taken as starting point to critically review some potential quantum resources, such as coherent ...
Svozil, Karl
core +1 more source
Man-in-the-middle-attack: Understanding in simple words
De nos jours, la cyberattaque est une infraction pénale grave et c'est d'ailleurs une question très débattue.L' attaque de l'homme du milieu est une sorte de cyberattaque où un tiers non approuvé entre dans une correspondance en ligne entre deux utilisateurs, reste échappé aux deux parties.Le logiciel malveillant qui est dans l'attaque du milieu ...
Avijit Mallik +3 more
openaire +2 more sources
A Review of Man-in-the-Middle Attacks
This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session ...
openaire +2 more sources
In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks.
Mina Malekzadeh +2 more
doaj +1 more source
Chip and Skim: cloning EMV cards with the pre-play attack [PDF]
EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication
Anderson, Ross +4 more
core +1 more source
A Lightweight Chaotic Map-Based Key Agreement Scheme for the Advanced Metering Infrastructure
In the advanced metering infrastructure (AMI), impersonation, eavesdropping, man-in-the-middle and other attacks occur in the process of communication between entities through public channels, which will lead to the leakage of user privacy or the ...
Baoyi Wang, Yaowei Feng, Shaomin Zhang
doaj +1 more source
As Internet of Things (IoT) devices leads an significant challenges in securing the systems from cyber-attacks in large-scale IoT networks. Traditional methods faces struggle to precisely detecting the complex intrusion patterns due to the heterogeneity ...
Prabu Selvam +8 more
doaj +1 more source

