Results 31 to 40 of about 1,025 (182)
As technology advances, the services provided by domain servers require new innovative techniques that can be optimized for frequent changes. Man-in-the-Middle (MitM) attacks on Domain Name Servers (DNS) pose a security threat, enabling attackers to ...
Ramahlapane Lerato Moila +1 more
doaj +1 more source
Implementation of CNN-MLP and CNN-LSTM for MitM Attack Detection System
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as
Hartina Hiromi Satyanegara +1 more
doaj +1 more source
Stealth-MITM DoS Attacks on Secure Channels
We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack
Herzberg, Amir, Shulman, Haya
openaire +2 more sources
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley +1 more source
Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa +6 more
wiley +1 more source
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process.
Zeeshan Ashraf +2 more
doaj +1 more source
Smart Home IoT Network Risk Assessment Using Bayesian Networks
A risk assessment model for a smart home Internet of Things (IoT) network is implemented using a Bayesian network. The directed acyclic graph of the Bayesian network is constructed from an attack graph that details the paths through which different ...
Miguel Flores +3 more
doaj +1 more source
This study provides a comprehensive review of predictive maintenance in aviation, emphasising the integration of digital twin technology, engineering data management and AI algorithms. It highlights how data‐driven approaches enhance safety, reduce costs and improve aircraft reliability through real‐time monitoring, fault detection and remaining useful
Saber Mehdipour +6 more
wiley +1 more source

