Results 161 to 170 of about 13,174 (191)
Anomaly detection with grid sentinel framework for electric vehicle charging stations in a smart grid environment. [PDF]
Kesavan VT +3 more
europepmc +1 more source
A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction. [PDF]
Talukder MA, Khalid M, Sultana N.
europepmc +1 more source
HCAP: Hybrid cyber attack prediction model for securing healthcare applications. [PDF]
Ali MF +6 more
europepmc +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IgG4H – mitme näoga immuunhaigus
2023Eesti Arst, 2023 ...
Tulk, Maris, Uibo, Raivo, Kuuse, Reet
openaire +1 more source
The Password Reset MitM Attack
2017 IEEE Symposium on Security and Privacy (SP), 2017We present the password reset MitM (PRMitM) attack and show how it can be used to take over user accounts. The PRMitM attack exploits the similarity of the registration and password reset processes to launch a man in the middle (MitM) attack at the application level.
Nethanel Gelernter +3 more
openaire +1 more source
Pilot Contamination with MITM Attack
2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017Existing studies on the secret key generation based on physical layer wireless fading channel are largely open under active attacks. In this paper, we discuss how the man-in-the- middle (MITM) attacker, who acts as a transparent relay, attacks the training phase in wireless communication to improve the information leaked rate.
Yu Huang +4 more
openaire +1 more source
2013
Our MITM attacks on SSP, BT-Nino-MITM attack [2, 20], BT-SSP-OOB-MITM attack [2, 22], BT-SSP-Printer-MITM attack [2, 21], and BT-SSP-HS/HF-MITM attack [2, 22] as well as a SSP MITM attack of Suomalainen et al. [19], are described in Sect. 5.1. Section 5.2 provides a literature-review-based comparative analysis of the existing MITM attacks on Bluetooth ...
Keijo Haataja +3 more
openaire +1 more source
Our MITM attacks on SSP, BT-Nino-MITM attack [2, 20], BT-SSP-OOB-MITM attack [2, 22], BT-SSP-Printer-MITM attack [2, 21], and BT-SSP-HS/HF-MITM attack [2, 22] as well as a SSP MITM attack of Suomalainen et al. [19], are described in Sect. 5.1. Section 5.2 provides a literature-review-based comparative analysis of the existing MITM attacks on Bluetooth ...
Keijo Haataja +3 more
openaire +1 more source
Limiting MitM to MitE Covert-Channels
2013 International Conference on Availability, Reliability and Security, 2013We study covert channels between a MitM attacker, and her MitE 'malware', running within the protected network of a victim organisation, and how to prevent or limit such channels. Our focus is on advanced timing channels, that allow communication between the MitM and MitE, even when hosts inside the protected network are restricted to only communicate ...
Amir Herzberg, Haya Shulman
openaire +1 more source

