Results 11 to 20 of about 13,174 (191)

Redox‐Programmed Activation of a Dual‐Modal Probe for High‐Fidelity Tumor Delineation and Image‐Guided Surgery

open access: yesAdvanced Science
The nonspecific activation of activatable probes presents significant challenges in their applications for accurate cancer detection, leading to false signals in normal tissues and the potential oversight of microlesions.
Haohao Yan   +4 more
doaj   +2 more sources

Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed

open access: yesIET Cyber-Physical Systems, 2021
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal ...
Patrick Wlazlo   +6 more
doaj   +1 more source

Ensuring the security of web applications operating on the basis of the SSL/TLS protocol [PDF]

open access: yesE3S Web of Conferences, 2023
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well as generating a secure session key and traffic privacy based on a symmetric key.
Razumov Pavel   +5 more
doaj   +1 more source

Neither Snow Nor Rain Nor MITM... [PDF]

open access: yesProceedings of the 2015 Internet Measurement Conference, 2015
The SMTP protocol is responsible for carrying some of users' most intimate communication, but like other Internet protocols, authentication and confidentiality were added only as an afterthought. In this work, we present the first report on global adoption rates of SMTP security extensions, including: STARTTLS, SPF, DKIM, and DMARC.
Zakir Durumeric   +9 more
openaire   +1 more source

Techno-Economic Aspect of the Man-in-the-Middle Attacks

open access: yesCommunications, 2017
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac   +3 more
doaj   +1 more source

INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK MENGANALISA SERANGAN MAN IN THE MIDDLE ATTACK BERBASIS EVIL TWIN

open access: yesIlkom Jurnal Ilmiah, 2017
MITM based Evil twin menjadi suatu ancaman yang berbahaya bagi para pengguna jaringan Wifi. Pelaku penyerangan ini memanfaatkan AP (Access Point) palsu dengan konfigurasi gateway yang berbeda dengan legitimate AP, sehingga jenis serangan ini menjadi ...
Muhammad Sabri Ahmad   +2 more
doaj   +1 more source

Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems [PDF]

open access: yesPeerJ Computer Science, 2021
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks.
Eko Hadiyono Riyadi   +2 more
doaj   +2 more sources

TSCBA-A Mitigation System for ARP Cache Poisoning Attacks

open access: yesCybernetics and Information Technologies, 2018
Address Resolution Protocol (ARP) cache poisoning results in numerous attacks. A novel mitigation system for ARP cache poisoning presented here avoids ARP cache poisoning attacks by introducing timestamps and counters in the ARP messages and ARP data ...
Prabadevi B., Jeyanthi N.
doaj   +1 more source

Security by Spatial Reference:Using Relative Positioning to Authenticate Devices for Spontaneous Interaction [PDF]

open access: yes, 2007
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction ...
C. Gehrmann   +13 more
core   +1 more source

END-TO-END SECURE WIRELESS SENSOR NETWORK USING PKI INFRASTRUCTURE AND RASPBERRY PI PICO W [PDF]

open access: yesRomanian Journal of Petroleum & Gas Technology
Industry 5.0 is the evolution of the industrial revolution that goes beyond automation and smart systems (Industry 4.0). It focuses on human-machine collaboration, sustainability, resilience, and security.
Emil Gocan   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy