Results 91 to 100 of about 8,344 (213)

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We analyze two general classes of unbalanced Feistel structures, namely contracting Feistels and expanding Feistels.
Jian Guo   +3 more
doaj   +1 more source

Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids

open access: yesIEEE Access
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri   +2 more
doaj   +1 more source

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance

open access: yes, 2016
Nowadays, auto insurance companies set personalized insurance rate based on data gathered directly from their customers' cars. In this paper, we show such a personalized insurance mechanism -- wildly adopted by many auto insurance companies -- is ...
Aggarwal C. C.   +12 more
core   +2 more sources

MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION [PDF]

open access: yesProceedings on Engineering Sciences
Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to ...
Pratik Kumar Swain   +2 more
doaj   +1 more source

HIDING BEHIND THE CLOUDS: EFFICIENT, PRIVACY-PRESERVING QUERIES VIA CLOUD PROXIES [PDF]

open access: yes, 2014
This project proposes PriView, a privacy-preserving technique for querying third-party ser- vices from mobile devices. Classical private information retrieval (PIR) schemes are diffi- cult to deploy and use, since they require the target service to be ...
Gaur, Surabhi
core   +1 more source

Intrusion detection in IoT networks using machine learning and deep learning approaches for MitM attack mitigation

open access: yesDiscover Internet of Things
The Internet of Things (IoT) revolutionizes connectivity but introduces significant security challenges, particularly concerning man-in-the-middle (MitM) attacks.
Muhanna Ahmed Ali   +1 more
doaj   +1 more source

Networked Control of a Small Drone Resilient to Cyber Attacks

open access: yesDrones
With increasing advances in networked systems and networked control systems in everyday life, the problem of cybersecurity becomes crucial. Moreover, in some applications like small UAVs, the safety and integrity of the system and its surroundings are ...
Octavian Ștefan, Alexandru Codrean
doaj   +1 more source

Mosul University WLAN Security: Evaluation, Analysis and Improvement [PDF]

open access: yesIraqi Journal for Electrical and Electronic Engineering, 2011
In this paper, Mosul University Wireless Local Area Networ (MUWLAN) security will be evaluated. The evaluation was made to test the confidentiality, integrity and availability of the MUWLAN.
Omar Ahmed Hachum
doaj  

Enhanced Abnormality Detection via PSO-Driven Adaptive Ensemble Weighting for Energy AIoT Device Security

open access: yesIEEE Access
The present era is characterized by the interconnection, communication, connectivity, and data exchange of Internet of Things (IoT) devices. However, current systems often neglect to incorporate security protocols for IoT devices in the energy sector ...
Qazi Waqas Khan   +5 more
doaj   +1 more source

Man In The Middle (Mitm) Attack Detection Tool Design

open access: yes, 2018
Man in the Middle (MITM) attack is aimed at seizing data between two nodes. The ARP Spoofing/Poisoning technique is a technique frequently used by attackers which allows MITM attacks to be carried out on local area networks (LANs). The attack exploits the vulnerabilities of ARP, which is a stateless protocol.
openaire   +1 more source

Home - About - Disclaimer - Privacy