Contents
Academic literature on the topic 'Man-in-the-middle-attack network scalability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Man-in-the-middle-attack network scalability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Man-in-the-middle-attack network scalability"
Yu, Wangke, Limeihui Yang, and Shuhua Wang. "New Lattice-Based Broadcast Authentication Protocol for Wireless Sensor Networks." Security and Communication Networks 2022 (September 30, 2022): 1–9. http://dx.doi.org/10.1155/2022/6809875.
Full textBuzura, Sorin, Mihaiela Lehene, Bogdan Iancu, and Vasile Dadarlat. "An Extendable Software Architecture for Mitigating ARP Spoofing-Based Attacks in SDN Data Plane Layer." Electronics 11, no. 13 (2022): 1965. http://dx.doi.org/10.3390/electronics11131965.
Full textHassen, Shaho, and Ahmed Abdlrazaq. "Contextual Deep Semantic Feature Driven Multi-Types Network Intrusion Detection System for IoT-Edge Networks." Zanco Journal of Pure and Applied Sciences 36, no. 6 (2024): 132–47. https://doi.org/10.21271/zjpas.36.6.14.
Full textLuo, Fuyuan, Tao Feng, and Lu Zheng. "Formal Security Evaluation and Improvement of Wireless HART Protocol in Industrial Wireless Network." Security and Communication Networks 2021 (November 23, 2021): 1–15. http://dx.doi.org/10.1155/2021/8090547.
Full textAlnaim, Abdulrahman K., and Ahmed M. Alwakeel. "Zero Trust Strategies for Cyber-Physical Systems in 6G Networks." Mathematics 13, no. 7 (2025): 1108. https://doi.org/10.3390/math13071108.
Full textRavindra, Krishnapura Srinivasa, and Malode Vishwanatha Panduranga Rao. "A novel secured open standard framework for internet of things applications integrating elliptic curve cryptography and fog computing." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 6 (2024): 7224. http://dx.doi.org/10.11591/ijece.v14i6.pp7224-7235.
Full textRailkar, Poonam Ninad, Parikshit Narendra Mahalle, Gitanjali Rahul Shinde, and Nilesh P. Sable. "Policy-aware Distributed and Dynamic Trust based Access Control Scheme for Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (2022): 155–65. http://dx.doi.org/10.17762/ijritcc.v10i1s.5820.
Full textShcherbyna, Serhii, and Trokhym Babych. "Framework for Threat Management and Incident Response in IoT Systems." NaUKMA Research Papers. Computer Science 7 (May 12, 2025): 77–88. https://doi.org/10.18523/2617-3808.2024.7.77-88.
Full textK, S. Ravindra, and Dr. MV Panduranga Rao. "A novel secured open standard framework for internet of things applications integrating elliptic curve cryptography and fog computing." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 6 (2024). https://doi.org/10.11591/ijece.v14i6.pp7224-7235.
Full textBook chapters on the topic "Man-in-the-middle-attack network scalability"
"Wireless Hacking." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch009.
Full text