Journal articles on the topic 'Address resolution protocol spoofing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Address resolution protocol spoofing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.
Full textAshok, Bawge, and Joshi Dr.Harish. "Identifying ARP Spoofing Through Active Strategies." Research and Applications: Emerging Technologies 7, no. 2 (2025): 21–27. https://doi.org/10.5281/zenodo.15573429.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.
Full textHerman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.
Full textYang, Jui-Pin. "Web-Based Enterprise Management-Address Resolution Protocol: An Efficient Scheme for Preventing Address Resolution Protocol Spoofing." Advanced Science, Engineering and Medicine 7, no. 11 (2015): 1003–6. http://dx.doi.org/10.1166/asem.2015.1796.
Full textAl Sukkar, Ghazi, Ramzi Saifan, Sufian Khwaldeh, Mahmoud Maqableh, and Iyad Jafar. "Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense." Communications and Network 08, no. 03 (2016): 118–30. http://dx.doi.org/10.4236/cn.2016.83012.
Full textMohammad Daud. "Detection of ARP Spoofing Attack by using ETTERCAP." Advances in Nonlinear Variational Inequalities 28, no. 4s (2025): 560–71. https://doi.org/10.52783/anvi.v28.3512.
Full textMehta, Suma B., and A. Rengarajan. "A Survey on ARP Poisoning." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 02 (2024): 1031–37. http://dx.doi.org/10.15680/ijircce.2024.1202051.
Full textNasser, Hiba, and Mohammed Hussain. "An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (2023): 8–17. http://dx.doi.org/10.37917/ijeee.19.2.2.
Full textHafizh, M. Nasir, Imam Riadi, and Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic." Jurnal Telekomunikasi dan Komputer 10, no. 2 (2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.
Full textJeong, Yeonseon, Hyunghoon Kim, and Hyo Jin Jo. "ASD: ARP Spoofing Detector Using OpenWrt." Security and Communication Networks 2022 (March 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/2196998.
Full textWijayanto, Agus, Imam Riadi, Yudi Prayudi, and Tri Sudinugraha. "Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method." Register: Jurnal Ilmiah Teknologi Sistem Informasi 8, no. 2 (2023): 156–69. http://dx.doi.org/10.26594/register.v8i2.2953.
Full textLu, Yiqin, Meng Wang, and Pengsen Huang. "An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5838657.
Full textSong, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, and Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.
Full textYang, Ru. "Study on ARP Protocol and Network Security in Digital Manufacturing." Applied Mechanics and Materials 484-485 (January 2014): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.191.
Full textJamil, Harun, Abid Ali, and Faisal Jamil. "Spoofing Attack Mitigation in Address Resolution Protocol (ARP) and DDoS in Software-Defined Networking." Journal of Information Security and Cybercrimes Research 5, no. 1 (2022): 31–42. http://dx.doi.org/10.26735/vbvs3993.
Full textRiadi, Imam, Abdul Fadlil, and Muhammad Nasir Hafizh. "Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology." Edumatic : Jurnal Pendidikan Informatika 4, no. 1 (2020): 21–29. http://dx.doi.org/10.29408/edumatic.v4i1.2046.
Full textChai, Tze Uei, Hock Guan Goh, Soung-Yue Liew, and Vasaki Ponnusamy. "Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory." Systems 11, no. 4 (2023): 211. http://dx.doi.org/10.3390/systems11040211.
Full textLi, Qijun, and Yipeng Dong. "Advanced approaches to prevent ARP attacks." Applied and Computational Engineering 44, no. 1 (2024): 124–37. http://dx.doi.org/10.54254/2755-2721/44/20230410.
Full textShah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (2019): 1095. http://dx.doi.org/10.3390/electronics8101095.
Full textDao, Quy-Thinh, Le-Trung Nguyen, Trung-Kien Ha, Viet-Hoang Nguyen, and Tuan-Anh Nguyen. "Investigation of Secure Communication of Modbus TCP/IP Protocol: Siemens S7 PLC Series Case Study." Applied System Innovation 8, no. 3 (2025): 65. https://doi.org/10.3390/asi8030065.
Full textPutra, Fauzan Prasetyo Eka, Ubaidi Ubaidi, Alief Badrit Tamam, and Reynal Widya Efendi. "Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security." Brilliance: Research of Artificial Intelligence 4, no. 1 (2024): 340–47. http://dx.doi.org/10.47709/brilliance.v4i1.4199.
Full textTissir, Najat, Noureddine Aboutabit, and Said El Kafhali. "Detection and prevention of Man-in-The-Middle attack in cloud computing using Openstack." Bulletin of Electrical Engineering and Informatics 14, no. 1 (2025): 377–87. http://dx.doi.org/10.11591/eei.v14i1.8103.
Full textDr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Ladde Akash, Jadhav Rohan, and Dani Rajrajeshwari. "A Decentralized Security Strategy to Counter ARP Cache Poisoning Attacks." Advancement and Research in Instrumentation Engineering 8, no. 2 (2025): 6–12. https://doi.org/10.5281/zenodo.15542613.
Full textGattu, Hanudeep, Joshnitha Karimireddy, and Kanishka G. "DNS Under Siege: Ethical DNS Spoofing and Countermeasures." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 250–54. https://doi.org/10.47001/irjiet/2025.inspire40.
Full textBuzura, Sorin, Mihaiela Lehene, Bogdan Iancu, and Vasile Dadarlat. "An Extendable Software Architecture for Mitigating ARP Spoofing-Based Attacks in SDN Data Plane Layer." Electronics 11, no. 13 (2022): 1965. http://dx.doi.org/10.3390/electronics11131965.
Full textIslam, Md Zahirul, Syed Md Galib, and Md Humaun Kabir. "Automation of 5G network slicing security using intent-based networking." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 401. http://dx.doi.org/10.11591/ijece.v15i1.pp401-413.
Full textIslam, Md. Zahirul, Syed Md. Galib, and Md. Humaun Kabir. "Automation of 5G network slicing security using intent-based networking." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 401–13. https://doi.org/10.11591/ijece.v15i1.pp401-413.
Full textDr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Rishikesh, Pratiksha, and Hinn Benny. "Mitigating ARP Poisoning Via Modified ICMP and Voting Mechanism." Journal of Research in Electrical Power System 1, no. 2 (2025): 8–16. https://doi.org/10.5281/zenodo.15573683.
Full textUsman, Muhammad, Rashid Amin, Hamza Aldabbas, and Bader Alouffi. "Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography." Electronics 11, no. 7 (2022): 1026. http://dx.doi.org/10.3390/electronics11071026.
Full textRaghu, Ram Chowdary Velevela. "A Systematic Review of IP Spoofing Attacks and Security Mechanisms in Modern Networks." Journal of Research and Review: Future Internet and Hyperconnectivity 1, no. 1 (2025): 31–39. https://doi.org/10.5281/zenodo.15111880.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full textMarzuki, Khairan, Naufal Hanif, and I. Putu Hariyadi. "Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Anti-Virus: The Analysis on Mail Servers." International Journal of Electronics and Communications Systems 2, no. 2 (2022): 65–73. http://dx.doi.org/10.24042/ijecs.v2i2.13543.
Full textTai, J. L., Nor Adnan Yahaya, and K. Daniel Wong. "Address Resolution Protocol Optimization." Jurnal Kejuruteraan 21, no. 1 (2009): 11–20. http://dx.doi.org/10.17576/jkukm-2009-21-02.
Full textN., D. Patel, Mehtre B.M., Wankar R., and Priyadarshi R. "Development of a Novel Methods for Detecting & Preventing the Spoofed attack Packets." International Journal of Microsystems and IoT 1, no. 2 (2023): 99–112. https://doi.org/10.5281/zenodo.8289269.
Full textSari, Linna Oktaviana, Ery Safrianti, and Defvi Wahyuningtias. "Analisis Keamanan Jaringan Berbasis Point to Point Protocol Over Ethernet (PPPoE) Menggunakan Mikrotik." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 3 (2024): 943–54. http://dx.doi.org/10.57152/malcom.v4i3.1301.
Full textGouda, Mohamed G., and Chin-Tser Huang. "A secure address resolution protocol." Computer Networks 41, no. 1 (2003): 57–71. http://dx.doi.org/10.1016/s1389-1286(02)00326-2.
Full textNarendhiran R, Pavithra K, Rakshana P, Sangeetha P. "Software Defined Based Pure VPN Protocol for Preventing IP Spoofing Attacks in IOT." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 3 (2019): 14–20. http://dx.doi.org/10.17762/ijritcc.v7i3.5251.
Full textLone, Imtiyaz Ahmad, Jahangeer Ali, and Kalimullah Lone. "IDARP: ID-based Address Resolution Protocol." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2013): 277–83. http://dx.doi.org/10.24297/ijct.v4i2a2.3171.
Full textLootah, Wesam, William Enck, and Patrick McDaniel. "TARP: Ticket-based address resolution protocol." Computer Networks 51, no. 15 (2007): 4322–37. http://dx.doi.org/10.1016/j.comnet.2007.05.007.
Full textPuhl, Zachary T., and Jinhua Guo. "Securing IPv6 Neighbor Discovery Address Resolution with Voucher-Based Addressing." Network 4, no. 3 (2024): 338–66. http://dx.doi.org/10.3390/network4030016.
Full textRahim, Muheez A., Bilkisu Jimada-Ojuolape, Monsurat O. Balogun, and Lambe M. Adesina. "Security analysis in wireless networks." Caliphate Journal of Science and Technology 7, no. 1 (2025): 1–11. https://doi.org/10.4314/cajost.v7i1.01.
Full textStepanov, P. P., G. V. Nikonova, T. S. Pavlychenko, and A. S. Gil. "The problem of security address resolution protocol." Journal of Physics: Conference Series 1791, no. 1 (2021): 012061. http://dx.doi.org/10.1088/1742-6596/1791/1/012061.
Full textHarjono, Harjono. "Address Resolution Protocol Functions in The Ethernet." JUITA : Jurnal Informatika 5, no. 2 (2018): 59. http://dx.doi.org/10.30595/juita.v5i2.2026.
Full textLi, Zhong, and Huimin Zhuang. "A multi-factor integration-based semi-supervised learning for address resolution protocol attack detection in SDIIoT." International Journal of Distributed Sensor Networks 17, no. 12 (2021): 155014772110599. http://dx.doi.org/10.1177/15501477211059940.
Full textChen, Geng, Wuyuan Xie, Di Lin, Ye Liu, and Miaohui Wang. "mmFAS: Multimodal Face Anti-Spoofing Using Multi-Level Alignment and Switch-Attention Fusion." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 1 (2025): 58–66. https://doi.org/10.1609/aaai.v39i1.31980.
Full textLema, Hussein, Fatuma Simba, and Joseph Mushi. "Security Enhancement of SIP Protocol in VoIP Communication." Journal of ICT Systems 1, no. 2 (2023): 71–92. http://dx.doi.org/10.56279/jicts.v1i2.32.
Full textWu, Jian Dong, and Guo Hui Huang. "ARP Fraudulence and Strategy in Local Area Network." Applied Mechanics and Materials 433-435 (October 2013): 1681–84. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1681.
Full textRahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering Research and Science 4, no. 12 (2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.
Full textRahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering and Technology Research 4, no. 12 (2019): 65–70. http://dx.doi.org/10.24018/ejeng.2019.4.12.1644.
Full text