Results 61 to 70 of about 8,344 (213)

Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari   +4 more
wiley   +1 more source

Preventing Man-in-The-Middle (MiTM) Attack of GSM Calls

open access: yesEuropean Journal of Electrical Engineering and Computer Science, 2021
Preventing man-in-the-middle (MiTM) attack using Artificial Neural Network refers to an in depth analysis of how calls are made vis-a-viz the structure of the inter-related operations that binds the respective subsystems within the GSM Architecture during calls. Calls in the GSM network is a request from aMobile Station (MS).
B. I. Bakare, S. M. Ekolama
openaire   +2 more sources

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks

open access: yesCryptography
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process.
Zeeshan Ashraf   +2 more
doaj   +1 more source

Selection of EAP-authentication methods in WLANs [PDF]

open access: yes, 2007
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks.
Ali, KM, Owens, TJ
core  

Beyond the Hype: On Using Blockchains in Trust Management for Authentication

open access: yes, 2017
Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting.
Alexopoulos, Nikolaos   +3 more
core   +1 more source

Advanced protocol against MITM attacks in Industrial Control System

open access: yesJournal of the Korea Institute of Information Security and Cryptology, 2015
If the industrial control system is infected by malicious worm such as Stuxnet, national disaster could be caused inevitably. Therefore, most of the industrial control system defence is focused on intrusion detection in network to protect against these threats.
Moo-seong Ko, Sang-kyo Oh, Kyung-ho Lee
openaire   +2 more sources

Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza   +4 more
wiley   +1 more source

Automatic analysis of distance bounding protocols [PDF]

open access: yes, 2009
Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in ...
Bruhadeshwar, Bezawada   +2 more
core  

Attack Resilient Microgrid: Impact Characterisation, Online Anomaly Detection and Mitigation

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
This paper proposes an attack‐resilient control framework for grid‐connected microgrids that enable real‐time detection and mitigation of stealthy cyber‐physical attacks on control and measurement signals. Using an online LSTM‐based anomaly detection system and a model‐based mitigation strategy, the framework maintains near‐optimal performance even ...
Nazmus Saqib   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy