Journal articles on the topic 'MAC address spoofing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 journal articles for your research on the topic 'MAC address spoofing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.
Full textJain, Lalit. "Computer Network: An Implementation of MAC Spoofing." International Journal of Engineering and Computer Science 12, no. 05 (2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.
Full textHerman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.
Full textNasser, Hiba, and Mohammed Hussain. "An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (2023): 8–17. http://dx.doi.org/10.37917/ijeee.19.2.2.
Full textAshok, Bawge, and Joshi Dr.Harish. "Identifying ARP Spoofing Through Active Strategies." Research and Applications: Emerging Technologies 7, no. 2 (2025): 21–27. https://doi.org/10.5281/zenodo.15573429.
Full textHammal, Mangal Muhammad Usman. "Detection and Mitigation of MAC Spoofing." LC International Journal of STEM 1, no. 2 (2020): 1–5. https://doi.org/10.5281/zenodo.5010206.
Full textAli, Hamid Mohamed, and Ammna Mohamed Abbas. "New Approach in Detection MAC Spoofing in a WiFi LAN." Journal of Engineering 20, no. 08 (2023): 142–55. http://dx.doi.org/10.31026/j.eng.2014.08.09.
Full textKurabalakota, Gowthami, Divya Pasham, and Kanishka G. "ARP Spoofing in Action: An Ethical Approach to Network Security." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 245–49. https://doi.org/10.47001/irjiet/2025.inspire39.
Full textTommi Alfian Armawan Sandi, Firmansyah Firmansyah, Sari Dewi, Eka Kusuma Pratama, and Rachmawati Darma Astuti. "Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky." Inspiration: Jurnal Teknologi Informasi dan Komunikasi 12, no. 2 (2022): 65–75. http://dx.doi.org/10.35585/inspir.v12i2.8.
Full textStepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.
Full textRahim, Muheez A., Bilkisu Jimada-Ojuolape, Monsurat O. Balogun, and Lambe M. Adesina. "Security analysis in wireless networks." Caliphate Journal of Science and Technology 7, no. 1 (2025): 1–11. https://doi.org/10.4314/cajost.v7i1.01.
Full textZhu, Zhi Yu. "Simulation Based on OPNET and within IPv6 Real Source Address Authentication." Applied Mechanics and Materials 246-247 (December 2012): 394–97. http://dx.doi.org/10.4028/www.scientific.net/amm.246-247.394.
Full textAlotaibi, Bandar, and Khaled Elleithy. "A New MAC Address Spoofing Detection Technique Based on Random Forests." Sensors 16, no. 3 (2016): 281. http://dx.doi.org/10.3390/s16030281.
Full textWijayanto, Agus, Imam Riadi, and Yudi Prayudi. "TAARA Method to Processing on the Network Forensics in the Event of an ARP Spoofing Attack." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 2 (2023): 208–2017. http://dx.doi.org/10.29207/resti.v7i2.4589.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 2280–91. http://dx.doi.org/10.11591/eei.v11i4.3810.
Full textHafizh, M. Nasir, Imam Riadi, and Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic." Jurnal Telekomunikasi dan Komputer 10, no. 2 (2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.
Full textShah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (2019): 1095. http://dx.doi.org/10.3390/electronics8101095.
Full textChai, Tze Uei, Hock Guan Goh, Soung-Yue Liew, and Vasaki Ponnusamy. "Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory." Systems 11, no. 4 (2023): 211. http://dx.doi.org/10.3390/systems11040211.
Full textSari, Linna Oktaviana, Ery Safrianti, and Defvi Wahyuningtias. "Analisis Keamanan Jaringan Berbasis Point to Point Protocol Over Ethernet (PPPoE) Menggunakan Mikrotik." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 3 (2024): 943–54. http://dx.doi.org/10.57152/malcom.v4i3.1301.
Full textSudaryanto and Dwi Nugraheny. "ANALISIS TRANSFER DATA PADA JARINGAN TERDAMPAK ARP SPOOFING MENGGUNAKAN METODE ARP POISONING DAN STATISTIK DESKRIPTIF." INDONESIAN JOURNAL ON DATA SCIENCE 2, no. 1 (2024): 10–18. http://dx.doi.org/10.30989/ijds.v2i1.1375.
Full textEmmanuel, Asituha. "A comprehensive survey of performance, security and privacy issues in the network interface layer of the TCP/IP." GSC Advanced Research and Reviews 18, no. 3 (2024): 208–33. https://doi.org/10.5281/zenodo.11217357.
Full textEmmanuel Asituha. "A comprehensive survey of performance, security and privacy issues in the network interface layer of the TCP/IP." GSC Advanced Research and Reviews 18, no. 3 (2024): 208–33. http://dx.doi.org/10.30574/gscarr.2024.18.3.0112.
Full textLema, Hussein, Fatuma Simba, and Joseph Mushi. "Security Enhancement of SIP Protocol in VoIP Communication." Journal of ICT Systems 1, no. 2 (2023): 71–92. http://dx.doi.org/10.56279/jicts.v1i2.32.
Full textNajjar, Firas, Qusay Bsoul, and Hasan Al-Refai. "An Analysis of Neighbor Discovery Protocol Attacks." Computers 12, no. 6 (2023): 125. http://dx.doi.org/10.3390/computers12060125.
Full textHermanto, Dedy, and M. Syaiful Anam. "Implementasi Sistem Keamanan Hotspot Jaringan Menggunakan Metode OpenSSL (Secure Socket Layer)." Jurnal CoreIT: Jurnal Hasil Penelitian Ilmu Komputer dan Teknologi Informasi 6, no. 1 (2020): 57. http://dx.doi.org/10.24014/coreit.v6i1.8394.
Full textAriyadi, Tamsir, and M. Rizky Pohan. "Implementation of Penetration Testing Tools to Test Wi-Fi Security Levels at the Directorate of Innovation and Business Incubators." Jurnal Penelitian Pendidikan IPA 9, no. 12 (2023): 10768–75. http://dx.doi.org/10.29303/jppipa.v9i12.5551.
Full textKorolkov, Roman. "AN ATTACK SCENARIO USING A ROGUE ACCESS POINT IN IEEE 802.11 NETWORKS." Cybersecurity: Education, Science, Technique 3, no. 11 (2021): 144–54. http://dx.doi.org/10.28925/2663-4023.2021.11.144154.
Full textDr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Rishikesh, Pratiksha, and Hinn Benny. "Mitigating ARP Poisoning Via Modified ICMP and Voting Mechanism." Journal of Research in Electrical Power System 1, no. 2 (2025): 8–16. https://doi.org/10.5281/zenodo.15573683.
Full textPramod, A. V., Md Abdul Azeem, and M. Om Prakash. "Detecting the Sybil Attack in Wireless Sensor Network :Survey." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 158–61. http://dx.doi.org/10.24297/ijct.v3i1c.2770.
Full textGirdler, Thomas, and Vassilios G. Vassilakis. "Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses." Computers & Electrical Engineering 90 (March 2021): 106990. http://dx.doi.org/10.1016/j.compeleceng.2021.106990.
Full textPartyka, Olha, Bohdan Fihol, and Taras Nakonechnyi. "INTEGRATED APPROACH TO DETECTING BLUETOOTH THREATS USING WIRESHARK AND SPLUNK SIEM." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 223–34. https://doi.org/10.28925/2663-4023.2024.26.684.
Full textDr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Ladde Akash, Jadhav Rohan, and Dani Rajrajeshwari. "A Decentralized Security Strategy to Counter ARP Cache Poisoning Attacks." Advancement and Research in Instrumentation Engineering 8, no. 2 (2025): 6–12. https://doi.org/10.5281/zenodo.15542613.
Full textAsija, Monika. "MAC Address." IRA-International Journal of Technology & Engineering (ISSN 2455-4480) 3, no. 1 (2016). http://dx.doi.org/10.21013/jte.v3.n1.p5.
Full textKemal, Bicakci, and Uzunay Yusuf. "Pushing the Limits of Address Based Authentication: How to Avoid MAC Address Spoofing in Wireless LANs." June 26, 2008. https://doi.org/10.5281/zenodo.1085637.
Full textKemal, Bicakci, and Uzunay Yusuf. "Pushing the Limits of Address Based Authentication: How to Avoid MAC Address Spoofing in Wireless LANs." International Journal of Electrical, Electronic and Communication Sciences 1.0, no. 6 (2008). https://doi.org/10.5281/zenodo.1335456.
Full text"Implementation of ARP Spoofing for IOT Devices Using Cryptography AES and ECDSA Algorithms." International Journal of Recent Technology and Engineering 8, no. 2S11 (2019): 2889–93. http://dx.doi.org/10.35940/ijrte.b1363.0982s1119.
Full textFerdous, A. Barbhuiya, Biswas Santosh, and Nandi Sukumar. "AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND ITS VERIFICATION." May 31, 2011. https://doi.org/10.5121/ijnsa.2011.3311.
Full textSong, Guangjia, Jianhua Hu, and Hui Wang. "A novel frame switching model based on virtual MAC in SDN." International Journal of Information Security, March 8, 2023. http://dx.doi.org/10.1007/s10207-022-00659-7.
Full textVajrobol, Vajratiya, Geetika Jain Saxena, Amit Pundir, et al. "Identify spoofing attacks in Internet of Things (IoT) environments using machine learning algorithms." Journal of High Speed Networks, December 10, 2024. https://doi.org/10.1177/09266801241295886.
Full textHiba, Imad Nasser, and Abdulridha Hussain Mohammed. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." August 1, 2022. https://doi.org/10.11591/eei.v11i4.3810.
Full text"Detection and Prevention of De-authentication Attack in Real-time Scenario." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (2019): 3324–30. http://dx.doi.org/10.35940/ijitee.j1217.0881019.
Full textMammadov, M., U. Safarova, T. Mammadli, E. Hacili, G. Ibrahimova, and T. Taghiyeva. "ANALYSIS OF ARP-SPOOFING ATTACK DETECTION METHODS IN THE NETWORK." Norwegian Journal of development of the International Science 142 (October 12, 2024). https://doi.org/10.5281/zenodo.13930713.
Full text"Cloud Security: Inter-Host Docker Container Communication using Vault Dynamic Secrets." International Journal of Innovative Technology and Exploring Engineering 9, no. 2S (2019): 395–401. http://dx.doi.org/10.35940/ijitee.b1035.1292s19.
Full textAbbas, Sara Adel, and Eman Mohamed El-Didamony. "Reduction of secondary lobes in joint angle and delay estimation in angle of arrival localization to detect MAC address spoofing in wireless networks." International Journal of Communication Networks and Information Security (IJCNIS) 12, no. 1 (2022). http://dx.doi.org/10.17762/ijcnis.v12i1.4353.
Full textElShafee, Ahmed, and Walid El-Shafai. "Design and analysis of data link impersonation attack for wired LAN application layer services." Journal of Ambient Intelligence and Humanized Computing, April 2, 2022. http://dx.doi.org/10.1007/s12652-022-03800-5.
Full textAmmar, Rayes. "Advanced Security Management in Metro Ethernet Networks." January 31, 2010. https://doi.org/10.5281/zenodo.1255892.
Full textNajat, Tissir, Aboutabit Noureddine, and El Kafhali Said. "Detection and prevention of Man-in-The-Middle attack in cloud computing using Openstack." February 1, 2025. https://doi.org/10.11591/eei.v14i1.8103.
Full text