共 50 条
[31]
Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2021, 69 (01)
:1159-1181
[32]
Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution
[J].
2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT,
2023,
[33]
Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
[J].
2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0,
2019,
:188-192
[34]
Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing
[J].
2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET,
2007,
:64-68
[35]
Research on User Authentication Scheme against the Man-in-the-Middle Attack
[J].
INFORMATION COMPUTING AND APPLICATIONS, PT 2,
2012, 308
:1-8
[36]
Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
[J].
JOURNAL OF INFORMATION PROCESSING SYSTEMS,
2009, 5 (03)
:131-134
[38]
Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP
[J].
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS,
2009,
:263-+
[39]
Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network
[J].
2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC,
2022,
[40]
Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence
[J].
2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024,
2024,