Results 161 to 170 of about 13,174 (191)

HCAP: Hybrid cyber attack prediction model for securing healthcare applications. [PDF]

open access: yesPLoS One
Ali MF   +6 more
europepmc   +1 more source

IgG4H – mitme näoga immuunhaigus

2023
Eesti Arst, 2023 ...
Tulk, Maris, Uibo, Raivo, Kuuse, Reet
openaire   +1 more source

The Password Reset MitM Attack

2017 IEEE Symposium on Security and Privacy (SP), 2017
We present the password reset MitM (PRMitM) attack and show how it can be used to take over user accounts. The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level.
Nethanel Gelernter   +3 more
openaire   +1 more source

Pilot Contamination with MITM Attack

2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017
Existing studies on the secret key generation based on physical layer wireless fading channel are largely open under active attacks. In this paper, we discuss how the man-in-the- middle (MITM) attacker, who acts as a transparent relay, attacks the training phase in wireless communication to improve the information leaked rate.
Yu Huang   +4 more
openaire   +1 more source

MITM Attacks on Bluetooth

2013
Our MITM attacks on SSP, BT-Nino-MITM attack [2, 20], BT-SSP-OOB-MITM attack [2, 22], BT-SSP-Printer-MITM attack [2, 21], and BT-SSP-HS/HF-MITM attack [2, 22] as well as a SSP MITM attack of Suomalainen et al. [19], are described in Sect. 5.1. Section 5.2 provides a literature-review-based comparative analysis of the existing MITM attacks on Bluetooth ...
Keijo Haataja   +3 more
openaire   +1 more source

Limiting MitM to MitE Covert-Channels

2013 International Conference on Availability, Reliability and Security, 2013
We study covert channels between a MitM attacker, and her MitE 'malware', running within the protected network of a victim organisation, and how to prevent or limit such channels. Our focus is on advanced timing channels, that allow communication between the MitM and MitE, even when hosts inside the protected network are restricted to only communicate ...
Amir Herzberg, Haya Shulman
openaire   +1 more source

Home - About - Disclaimer - Privacy