Results 31 to 40 of about 1,025 (182)

Lightweight Anomaly-Based Detection Using Cuckoo Search Algorithm and Decision Tree to Mitigate Man-in-the-Middle Attacks in DNS

open access: yesApplied Sciences
As technology advances, the services provided by domain servers require new innovative techniques that can be optimized for frequent changes. Man-in-the-Middle (MitM) attacks on Domain Name Servers (DNS) pose a security threat, enabling attackers to ...
Ramahlapane Lerato Moila   +1 more
doaj   +1 more source

Implementation of CNN-MLP and CNN-LSTM for MitM Attack Detection System

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2022
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as
Hartina Hiromi Satyanegara   +1 more
doaj   +1 more source

Stealth-MITM DoS Attacks on Secure Channels

open access: yes, 2009
We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack
Herzberg, Amir, Shulman, Haya
openaire   +2 more sources

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

C3Crowd$C^3Crowd$: Crowd Contributor and Consumer Framework for Secure Crowd Management Using Blockchain

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley   +1 more source

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks

open access: yesCryptography
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process.
Zeeshan Ashraf   +2 more
doaj   +1 more source

Smart Home IoT Network Risk Assessment Using Bayesian Networks

open access: yesEntropy, 2022
A risk assessment model for a smart home Internet of Things (IoT) network is implemented using a Bayesian network. The directed acyclic graph of the Bayesian network is constructed from an attack graph that details the paths through which different ...
Miguel Flores   +3 more
doaj   +1 more source

Integrating Digital Twins, Data Management and Artificial Intelligence for Predictive Maintenance in Aviation: A Comprehensive Review

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
This study provides a comprehensive review of predictive maintenance in aviation, emphasising the integration of digital twin technology, engineering data management and AI algorithms. It highlights how data‐driven approaches enhance safety, reduce costs and improve aircraft reliability through real‐time monitoring, fault detection and remaining useful
Saber Mehdipour   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy