共 75 条
[1]
Ahmadi S, 2011, MOBILE WIMAX: A SYSTEMS APPROACH TO UNDERSTANDING IEEE 802.16M RADIO ACCESS TECHNOLOGY, P657, DOI 10.1016/B978-0-12-374964-2.10012-8
[2]
A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing
[J].
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018),
2018, 141
:24-31
[4]
[Anonymous], 2008, P NETW SYST IMPL NSD
[5]
[Anonymous], 2018, PRACTICAL INFORM SEC
[6]
[Anonymous], 2016, UNIISO 17294 2, P1
[7]
Ashi Z, 2020, INT J COMPUT APPL, V175, P30, DOI 10.5120/ijca2020920648
[8]
Detecting Man-in-the-Middle Attacks by Precise Timing
[J].
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES,
2009,
:81-+
[9]
Barnaba M, 2003, ANTICAP
[10]
Bhaiji Y., 2007, Understanding, Preventing, and Defending Against Layer 2 Attacks