Academic literature on the topic 'MAC address spoofing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MAC address spoofing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "MAC address spoofing"
Nasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.
Full textJain, Lalit. "Computer Network: An Implementation of MAC Spoofing." International Journal of Engineering and Computer Science 12, no. 05 (2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.
Full textHerman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.
Full textNasser, Hiba, and Mohammed Hussain. "An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (2023): 8–17. http://dx.doi.org/10.37917/ijeee.19.2.2.
Full textAshok, Bawge, and Joshi Dr.Harish. "Identifying ARP Spoofing Through Active Strategies." Research and Applications: Emerging Technologies 7, no. 2 (2025): 21–27. https://doi.org/10.5281/zenodo.15573429.
Full textHammal, Mangal Muhammad Usman. "Detection and Mitigation of MAC Spoofing." LC International Journal of STEM 1, no. 2 (2020): 1–5. https://doi.org/10.5281/zenodo.5010206.
Full textAli, Hamid Mohamed, and Ammna Mohamed Abbas. "New Approach in Detection MAC Spoofing in a WiFi LAN." Journal of Engineering 20, no. 08 (2023): 142–55. http://dx.doi.org/10.31026/j.eng.2014.08.09.
Full textKurabalakota, Gowthami, Divya Pasham, and Kanishka G. "ARP Spoofing in Action: An Ethical Approach to Network Security." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 245–49. https://doi.org/10.47001/irjiet/2025.inspire39.
Full textTommi Alfian Armawan Sandi, Firmansyah Firmansyah, Sari Dewi, Eka Kusuma Pratama, and Rachmawati Darma Astuti. "Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky." Inspiration: Jurnal Teknologi Informasi dan Komunikasi 12, no. 2 (2022): 65–75. http://dx.doi.org/10.35585/inspir.v12i2.8.
Full textStepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.
Full textDissertations / Theses on the topic "MAC address spoofing"
Dušek, Jakub. "Penetrační testování ANC." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.
Full textChang, Ko-Chen, and 張克塵. "Design of an Agent-based Mechanism to Counter MAC Address Spoofing Threats in Wireless Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/53232195868099707295.
Full textChang, Hsun Che, and 張勛哲. "Design of a Detection and Recovery System for MAC Address Spoofing Attacks in Dual-stack Environment." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/09351567947345952804.
Full textBook chapters on the topic "MAC address spoofing"
Jung, Sungmo, Jong Hyun Kim, and Seoksoo Kim. "A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment." In Advanced Communication and Networking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23312-8_4.
Full textBaral, Prashant, Ning Yang, and Ning Weng. "IoT Device Identification Using Device Fingerprint and Deep Learning." In Deep Learning and Reinforcement Learning [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.111554.
Full textDudnik, Аndriy, and Olexandr Usachenko. "METHODS OF DETERMINATION OF INTERFERENCES IN WIRELESS COMPUTER NETWORKS." In Science, technology, and innovation: the experience of European countries and prospects for Ukraine. Publishing House “Baltija Publishing”, 2021. http://dx.doi.org/10.30525/978-9934-26-190-9-1.
Full textBhimavarapu, Usharani. "Advanced Deep Learning Frameworks for Cyber Security in IoT-Based Healthcare." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch014.
Full textMakhlouf, Amel Meddeb, and Noureddine Boudriga. "Intrusion and Anomaly Detection in Wireless Networks." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch006.
Full textConference papers on the topic "MAC address spoofing"
U, Kumaran, B. Umah, Neeharika Ayalasomayujala, Akshith Kosanam, and G. Vivek. "MAC Address Spoofing and its Impact on Network Security." In 2024 4th International Conference on Sustainable Expert Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63445.2024.10763130.
Full textChumchu, Prawit, Tanatat Saelim, and Chunyamon Sriklauy. "A new MAC address spoofing detection algorithm using PLCP header." In 2011 International Conference on Information Networking (ICOIN). IEEE, 2011. http://dx.doi.org/10.1109/icoin.2011.5723112.
Full text"WISE GUARD - MAC Address Spoofing Detection System for Wireless LANs." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0002123601400147.
Full textHuang, I.-Hsuan, Ko-Chen Chang, Yu-Chi Lu, and Cheng-Zen Yang. "Countermeasures against MAC address spoofing in public wireless networks using lightweight agents." In 5th International ICST Conference on Wireless Internet. IEEE, 2010. http://dx.doi.org/10.4108/icst.wicon2010.8622.
Full textShaw, Shashi, and Prasenjit Choudhury. "A new local area network attack through IP and MAC address spoofing." In 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA). IEEE, 2015. http://dx.doi.org/10.1109/icacea.2015.7164728.
Full textVijayakumar, R., K. Selvakumar, K. Kulothungan, and A. Kannan. "Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6950125.
Full textKleptsov, M. Y., and M. V. Katina. "A METHOD FOR DETECTING AND PREVENTING ARP-SPOOFING ATTACKS ON A COMPUTER NETWORK." In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-611-616.
Full textPuanpronpitag, Somnuk, and Atthapol Suwannasa. "A design of egress NAC using an authentication visa checking mechanism to protect against MAC address spoofing attacks." In 2011 8th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2011). IEEE, 2011. http://dx.doi.org/10.1109/ecticon.2011.5947832.
Full textTOMCO, Vilma, and Klorenta PASHAJ. "Enhancing Cybersecurity for UAV Systems: Implementing NIS2 Provisions for Safe Drone Deployment in Albania." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2024. http://dx.doi.org/10.19107/cybercon.2024.04.
Full text