Results 101 to 110 of about 8,344 (213)
Wireless Networks Security Flaws and Hacking Avenues of Attacks
An access point offers wireless networking to several wireless client nodes in the shared medium when using IEEE 802.11 wireless local area networks in infrastructure mode. The related nodes could be at risk of security attacks.
Asmaa Akram Ghanim +1 more
doaj +1 more source
Cryptanalysis of Full-Round BipBip
BipBip is a low-latency tweakable block cipher proposed by Belkheyar et al. in 2023. It was designed for pointer encryption inside a new memory safety mechanism called Cryptographic Capability Computing (C3). BipBip encrypts blocks of 24 bits using a 40-
Jinliang Wang +5 more
doaj +1 more source
Integrated security systems for protecting payment synchronization from MITM attacks
The article addresses the challenge of securing payment synchronization against Man-in-the-Middle (MITM) attacks in multichannel payment systems, where cash, card, and online transactions are integrated with CRM and accounting platforms. It examines MITM attack scenarios and their impact on transaction integrity.
I.O. Shahmatov, I.V. Zamrii
openaire +3 more sources
Scalable cyber‐physical testbed for cybersecurity evaluation of synchrophasors in power systems
This paper presents a synchrophasor‐based real‐time cyber‐physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real‐
Shuvangkar Chandra Das +2 more
doaj +1 more source
A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks
Nowadays, most public facilities provide free internet access to support daily activities. These public internet facilities are open to anyone, making them prone to attacks.
Standy Oei +2 more
doaj +1 more source
The MQTT (Message Queuing Telemetry Transport) protocol used the pub-sub model for IoT communication. Bolstering security with two-way authentication becomes a critical necessity.
Pallavi S. Bangare, Kishor P. Patil
doaj +1 more source
This paper presents a comprehensive study on the security of wireless control systems by modeling a practical cyber-attack scenario that combines eavesdropping and man-in-the-middle (MITM) techniques over the MQTT protocol.
Ngoc Ha An +2 more
doaj +1 more source
A hybrid blockchain based deep learning model for multivector attack detection in internet of things enabled healthcare systems. [PDF]
Sengan S, Shieh CS, Horng MF.
europepmc +1 more source
Security Audit of IoT Device Networks: A Reproducible Machine Learning Framework for Threat Detection and Performance Benchmarking. [PDF]
Shaikhanova A +5 more
europepmc +1 more source
A dataset collected in real-world industrial control systems for network attack detection. [PDF]
Zhou X +9 more
europepmc +1 more source

