Journal articles on the topic 'Arp cache poisoning'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 26 journal articles for your research on the topic 'Arp cache poisoning.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Prabadevi, B., and N. Jeyanthi. "TSCBA-A Mitigation System for ARP Cache Poisoning Attacks." Cybernetics and Information Technologies 18, no. 4 (2018): 75–93. http://dx.doi.org/10.2478/cait-2018-0049.
Full textShah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (2019): 1095. http://dx.doi.org/10.3390/electronics8101095.
Full textSuethanuwong, Ekarin. "An Effective Prevention Approach against ARP Cache Poisoning Attacks in MikroTik-based Networks." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 19, no. 1 (2024): 1–12. http://dx.doi.org/10.37936/ecti-cit.2025191.256401.
Full textDr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Ladde Akash, Jadhav Rohan, and Dani Rajrajeshwari. "A Decentralized Security Strategy to Counter ARP Cache Poisoning Attacks." Advancement and Research in Instrumentation Engineering 8, no. 2 (2025): 6–12. https://doi.org/10.5281/zenodo.15542613.
Full textLi, Qijun, and Yipeng Dong. "Advanced approaches to prevent ARP attacks." Applied and Computational Engineering 44, no. 1 (2024): 124–37. http://dx.doi.org/10.54254/2755-2721/44/20230410.
Full textRaval, Neel, and Payal Chaudary. "Detection and Prevention of ARP Cache Poisoning." International Journal of Engineering Trends and Technology 30, no. 3 (2015): 159–60. http://dx.doi.org/10.14445/22315381/ijett-v30p230.
Full textSen, Anurag Kumar, Munesh Chandra Trivedi, Virendra Kumar Yadav, and Jayati Bhardwaj. "ARP cache poisoning: detection, mitigation and prevention schemes." International Journal of Computational Vision and Robotics 11, no. 4 (2021): 357. http://dx.doi.org/10.1504/ijcvr.2021.10037475.
Full textBhardwaj, Jayati, Virendra Kumar Yadav, Munesh Chandra Trivedi, and Anurag Kumar Sen. "ARP cache poisoning: detection, mitigation and prevention schemes." International Journal of Computational Vision and Robotics 11, no. 4 (2021): 357. http://dx.doi.org/10.1504/ijcvr.2021.116547.
Full textDr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Rishikesh, Pratiksha, and Hinn Benny. "Mitigating ARP Poisoning Via Modified ICMP and Voting Mechanism." Journal of Research in Electrical Power System 1, no. 2 (2025): 8–16. https://doi.org/10.5281/zenodo.15573683.
Full textTrabelsi, Zouheir, and Hamza Rahmani. "An Anti-Sniffer Based on ARP Cache Poisoning Attack." Information Systems Security 13, no. 6 (2005): 23–36. http://dx.doi.org/10.1201/1086/44954.13.6.20050101/86218.5.
Full textPrabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.
Full textPrabadevi, B., and N. Jeyanthi. "A framework to mitigate ARP sniffing attacks by cache poisoning." International Journal of Advanced Intelligence Paradigms 10, no. 1/2 (2018): 146. http://dx.doi.org/10.1504/ijaip.2018.089496.
Full textPrabadevi, B., and N. Jeyanthi. "A framework to mitigate ARP sniffing attacks by cache poisoning." International Journal of Advanced Intelligence Paradigms 10, no. 1/2 (2018): 146. http://dx.doi.org/10.1504/ijaip.2018.10010532.
Full textSakhawat, Daniyal, Abdul Nasir Khan, Mudassar Aslam, and Anthony T. Chronopoulos. "Agent‐based ARP cache poisoning detection in switched LAN environments." IET Networks 8, no. 1 (2019): 67–73. http://dx.doi.org/10.1049/iet-net.2018.5084.
Full textBrown, J. David, and Tricia J. Willink. "ARP Cache Poisoning and Routing Loops in ad Hoc Networks." Mobile Networks and Applications 23, no. 5 (2018): 1306–17. http://dx.doi.org/10.1007/s11036-018-1039-6.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 2280–91. http://dx.doi.org/10.11591/eei.v11i4.3810.
Full textAlmaarif, Ahmad, and Setiadi Yazid. "ARP Cache Poisoning sebagai Teknik Alternatif untuk Membatasi Penggunaan Bandwidth berbasis Waktu." Jurnal Rekayasa Sistem & Industri (JRSI) 5, no. 02 (2018): 108. http://dx.doi.org/10.25124/jrsi.v5i02.367.
Full textTrabelsi, Zouheir. "Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network." Information Security Journal: A Global Perspective 25, no. 1-3 (2016): 68–82. http://dx.doi.org/10.1080/19393555.2016.1170912.
Full textDon, Africa, Aaron, and Torrizo, Lorwin Felimar. "Comparative Study of Intrusion Detection Systems against Mainstream Network Sniffing Tools." International Journal of Engineering & Technology 7, no. 4.16 (2018): 188–91. http://dx.doi.org/10.14419/ijet.v7i4.16.22884.
Full textMd., Ataullah, and Chauhan Naveen. "An Efficient and Secure Solution for the Problems of ARP Cache Poisoning Attacks." August 28, 2012. https://doi.org/10.5281/zenodo.1080064.
Full textBruschi, Danilo, Andrea Di Pasquale, Andrea Lanzi, and Elena Pagani. "Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks." Journal of Computer Security, February 1, 2024, 1–29. http://dx.doi.org/10.3233/jcs-230023.
Full textHiba, Imad Nasser, and Abdulridha Hussain Mohammed. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." August 1, 2022. https://doi.org/10.11591/eei.v11i4.3810.
Full textAlmaarif, Ahmad, and Setiadi Yazid. "ARP Cache Poisoning sebagai Teknik Alternatif untuk Membatasi Penggunaan Bandwidth berbasis Waktu." Jurnal Rekayasa Sistem & Industri (JRSI) 6, no. 1 (2019). http://dx.doi.org/10.25124/jrsi.v6i1.367.
Full textSmyth, Dylan, Sandra Scott-Hayward, Victor Cionca, Sean McSweeney, and Donna O’Shea. "SECAP Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes." Journal of Network and Systems Management 31, no. 1 (2023). http://dx.doi.org/10.1007/s10922-022-09714-z.
Full textZou, Qingtian, Lan Zhang, Anoop Singhal, Xiaoyan Sun, and Peng Liu. "Analysis of neural network detectors for network attacks." Journal of Computer Security, November 15, 2023, 1–28. http://dx.doi.org/10.3233/jcs-230031.
Full textSubashri, T., and V. Vaidehi. "EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORK." October 31, 2010. https://doi.org/10.5121/ijnsa.2010.2416.
Full text