Academic literature on the topic 'DNS spoofing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'DNS spoofing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "DNS spoofing"
Carvalho, Henrique Carlos Fonte Boa, and Eduardo Pelli. "Técnicas de reconhecimento de padrões para identificação de ataque de DNS." Revista Brasileira de Computação Aplicada 9, no. 2 (2017): 99. http://dx.doi.org/10.5335/rbca.v9i2.6279.
Full textZhang, Ya Lan, and Gui Shu Xia. "The SSL MIMT Attack with DNS Spoofing." Applied Mechanics and Materials 385-386 (August 2013): 1647–50. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1647.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full textPatel, Maitri, and Rajan Patel. "Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem." Emerging Science Journal 5, no. 1 (2021): 77–84. http://dx.doi.org/10.28991/esj-2021-01259.
Full textIlyenko, Anna, Sergii Ilyenko, and Oleksandr Vertypolokh. "METHOD FOR PROTECTION TRAFFIC FROM INTERVENTION OF DPI SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 75–87. http://dx.doi.org/10.28925/2663-4023.2020.10.7587.
Full textRanjith Kanna Kanna, Ranjith Kanna Kanna, Venkatramulu Sunkari, and Punnam Chander. "Dos and ARP Spoofing Attacks Analysis through Agent Software." Indian Journal of Applied Research 3, no. 5 (2011): 253–55. http://dx.doi.org/10.15373/2249555x/may2013/77.
Full textChoi, Jun-Ho, Yong-Jin Baek, and Yeong-Geon Seo. "Poisoning Attack detection and blocking model based on ARP Spoofing tool." Journal of Digital Contents Society 22, no. 5 (2021): 809–16. http://dx.doi.org/10.9728/dcs.2021.22.5.809.
Full textBok, Jin Yeong, Kun Ha Suh, and Eui Chul Lee. "Verifying the Effectiveness of New Face Spoofing DB with Capture Angle and Distance." Electronics 9, no. 4 (2020): 661. http://dx.doi.org/10.3390/electronics9040661.
Full textWang, Hui Ran, and Rui Fang Ma. "Security Protocol for Electrical Remote Terminal Units." Applied Mechanics and Materials 392 (September 2013): 601–4. http://dx.doi.org/10.4028/www.scientific.net/amm.392.601.
Full textWang, Hui Ran, and Rui Fang Ma. "A Protocol with Security Mechanism for Electrical RTU." Advanced Engineering Forum 6-7 (September 2012): 481–84. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.481.
Full textDissertations / Theses on the topic "DNS spoofing"
Tan, Eunice Zsu. "A Quantitative Study of the Deployment of the Sender Policy Framework." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7009.
Full textAvanzato, Simone. "Sicurezza e DNS: test di attacco e difesa." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textPlašil, Matouš. "Soubor laboratorních úloh k demonstraci počítačových útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220402.
Full textEdmunds, Taiamiti. "Protection of 2D face identification systems against spoofing attacks." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT007/document.
Full textTang, Yinhang. "Contributions to biometrics : curvatures, heterogeneous cross-resolution FR and anti spoofing." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSEC060/document.
Full textMarček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Full textKose, Neslihan. "Leurrage et dissimulation en reconnaissance faciale : analyses et contre attaques." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0020/document.
Full textBooks on the topic "DNS spoofing"
Russel, Ryan. Die Hacker-Bibel: [die Kunst des diffing, sniffing und spoofing ; Format String-Schwachstellen ; Buffer-overflow-Angriffe]. 2nd ed. Mitp, 2002.
Find full textBook chapters on the topic "DNS spoofing"
Moriyama, Eimatsu, Takeshi Takahashi, and Daisuke Miyamoto. "DNS-Based Defense against IP Spoofing Attacks." In Neural Information Processing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_71.
Full textBai, Xiaolong, Liang Hu, Zixing Song, Feiyan Chen, and Kuo Zhao. "Defense against DNS Man-In-The-Middle Spoofing." In Web Information Systems and Mining. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23971-7_39.
Full text"Miscellaneous Tools." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch010.
Full textDhanalakshmi, Ranaganayakulu, and Chenniappan Chellappan. "Fraud and Identity Theft Issues." In Strategic and Practical Approaches for Information Security Governance. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0197-0.ch014.
Full textL., Kavisankar, Chellappan C., and Poovammal E. "Against Spoofing Attacks in Network Layer." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch003.
Full textShamsolmoali, Pourya, Masoumeh Zareapoor, and M. Afshar Alam. "Multi-Aspect DDOS Detection System for Securing Cloud Network." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch096.
Full textShamsolmoali, Pourya, Masoumeh Zareapoor, and M. Afshar Alam. "Multi-Aspect DDOS Detection System for Securing Cloud Network." In Handbook of Research on End-to-End Cloud Computing Architecture Design. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0759-8.ch010.
Full textStevens, Dwayne, and David T. Green. "A Strategy for Enterprise VoIP Security." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch041.
Full textStevens, Dwayne, and David T. Green. "A Strategy for Enterprise VoIP Security." In Networking and Telecommunications. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch093.
Full textVerma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch012.
Full textConference papers on the topic "DNS spoofing"
Sahri, Nm, and Koji Okamura. "Protecting DNS services from IP spoofing." In CFI '16: The 11th International Conference on Future Internet Technologies. ACM, 2016. http://dx.doi.org/10.1145/2935663.2935666.
Full textMaksutov, Artem A., Ilya A. Cherepanov, and Maksim S. Alekseev. "Detection and prevention of DNS spoofing attacks." In 2017 Siberian Symposium on Data Science and Engineering (SSDSE). IEEE, 2017. http://dx.doi.org/10.1109/ssdse.2017.8071970.
Full textHussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "DNS Protection against Spoofing and Poisoning Attacks." In 2016 3rd International Conference on Information Science and Control Engineering (ICISCE). IEEE, 2016. http://dx.doi.org/10.1109/icisce.2016.279.
Full textTripathi, Nikhil, Mayank Swarnkar, and Neminath Hubballi. "DNS spoofing in local networks made easy." In 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2017. http://dx.doi.org/10.1109/ants.2017.8384122.
Full textAbdelmajid, Nabih, Anang Amin, and Shehab A. R. Farhan. "Location Based Model For Prevention DNS Spoofing." In ICICSE '20: 2020 International Conference on Internet Computing for Science and Engineering. ACM, 2020. http://dx.doi.org/10.1145/3424311.3424329.
Full textSahri, NM, and Koji Okamura. "Collaborative Spoofing Detection and Mitigation -- SDN Based Looping Authentication for DNS Services." In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2016. http://dx.doi.org/10.1109/compsac.2016.6.
Full textBarbhuiya, F. A., S. Biswas, and S. Nandi. "An active DES based IDS for ARP spoofing." In 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2011. http://dx.doi.org/10.1109/icsmc.2011.6084088.
Full textBarbhuiya, Ferdous A., Santosh Biswas, Neminath Hubballi, and Sukumar Nandi. "A host based DES approach for detecting ARP spoofing." In 2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci. IEEE, 2011. http://dx.doi.org/10.1109/cicybs.2011.5949401.
Full textMustafa, Hossen, Wenyuan Xu, Ahmad Reza Sadeghi, and Steffen Schulz. "You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks." In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2014. http://dx.doi.org/10.1109/dsn.2014.102.
Full textNeminath, H., S. Biswas, S. Roopa, et al. "A DES approach to intrusion detection system for ARP spoofing attacks." In Automation (MED 2010). IEEE, 2010. http://dx.doi.org/10.1109/med.2010.5547790.
Full text