Results 11 to 20 of about 13,174 (191)
The nonspecific activation of activatable probes presents significant challenges in their applications for accurate cancer detection, leading to false signals in normal tissues and the potential oversight of microlesions.
Haohao Yan +4 more
doaj +2 more sources
Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal ...
Patrick Wlazlo +6 more
doaj +1 more source
Ensuring the security of web applications operating on the basis of the SSL/TLS protocol [PDF]
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well as generating a secure session key and traffic privacy based on a symmetric key.
Razumov Pavel +5 more
doaj +1 more source
Neither Snow Nor Rain Nor MITM... [PDF]
The SMTP protocol is responsible for carrying some of users' most intimate communication, but like other Internet protocols, authentication and confidentiality were added only as an afterthought. In this work, we present the first report on global adoption rates of SMTP security extensions, including: STARTTLS, SPF, DKIM, and DMARC.
Zakir Durumeric +9 more
openaire +1 more source
Techno-Economic Aspect of the Man-in-the-Middle Attacks
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac +3 more
doaj +1 more source
MITM based Evil twin menjadi suatu ancaman yang berbahaya bagi para pengguna jaringan Wifi. Pelaku penyerangan ini memanfaatkan AP (Access Point) palsu dengan konfigurasi gateway yang berbeda dengan legitimate AP, sehingga jenis serangan ini menjadi ...
Muhammad Sabri Ahmad +2 more
doaj +1 more source
Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems [PDF]
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks.
Eko Hadiyono Riyadi +2 more
doaj +2 more sources
TSCBA-A Mitigation System for ARP Cache Poisoning Attacks
Address Resolution Protocol (ARP) cache poisoning results in numerous attacks. A novel mitigation system for ARP cache poisoning presented here avoids ARP cache poisoning attacks by introducing timestamps and counters in the ARP messages and ARP data ...
Prabadevi B., Jeyanthi N.
doaj +1 more source
Security by Spatial Reference:Using Relative Positioning to Authenticate Devices for Spontaneous Interaction [PDF]
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction ...
C. Gehrmann +13 more
core +1 more source
END-TO-END SECURE WIRELESS SENSOR NETWORK USING PKI INFRASTRUCTURE AND RASPBERRY PI PICO W [PDF]
Industry 5.0 is the evolution of the industrial revolution that goes beyond automation and smart systems (Industry 4.0). It focuses on human-machine collaboration, sustainability, resilience, and security.
Emil Gocan +2 more
doaj +1 more source

