Academic literature on the topic 'MITM sniffing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MITM sniffing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "MITM sniffing"
Ajharie, Mohamad Arie, and Mulia Sulistiyono. "IMPLEMENTASI FRAMEWORK MITM (MAN IN THE MIDDLE ATTACK) UNTUK MEMANTAU AKTIFITAS PENGGUNA DALAM SATU JARINGAN." Jurnal Infomedia 7, no. 1 (2022): 45. http://dx.doi.org/10.30811/jim.v7i1.2966.
Full textChliah, Mouhcine, Ghizlane Orhanou, and Said El Hajji. "Countering MitM Attacks Using Evolved PathFinder Algorithm." International Journal of Cloud Applications and Computing 7, no. 2 (2017): 41–61. http://dx.doi.org/10.4018/ijcac.2017040104.
Full textB., Prabadevi, and Jeyanthi N. "A Review on Various Sniffing Attacks and its Mitigation Techniques." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1117–25. https://doi.org/10.11591/ijeecs.v12.i3.pp1117-1125.
Full textAbdinurova, N., D. Akmyrza, and A. Mirash. "MITM. WHAT IS IT, HOW TO PROTECT YOURSELF ANDIMPLEMENTATION FOR INSTRUCTIONAL USE." Suleyman Demirel University Bulletin Natural and Technical Sciences 56, no. 3 (2021): 28–35. https://doi.org/10.47344/sdubnts.v56i3.612.
Full textArianto, Ilham Gumeraruloh, Wina Witanti, and Herdi Ashaury. "Sistem Keamanan Otentikasi Pengguna Pada Modul Single Sign On Menggunakan OAuth 2.0 dan One Time Password." Jurnal Ilmu Komputer dan Teknologi 6, no. 1 (2025): 25–31. https://doi.org/10.35960/ikomti.v6i1.1768.
Full textPrabadevi, B., and N. Jeyanthi. "A Review on Various Sniffing Attacks and its Mitigation Techniques." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1117. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1117-1125.
Full textShaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.
Full textR, Santhakumar, Keerthana R, Madhubala S, and Dr Thamizh Selvam D. "Session Hijacking in Cybersecurity: Threats, Prevention Strategies, and Future Directions." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft029.
Full textRahman Ismansyah Putra, Muhammad Arief, and Agus Prihanto. "Analisis Keamanan Data Pada Aplikasi Android Menggunakan HTTP Canary (Studi Kasus : Siakadu UNESA Mobile)." Journal of Informatics and Computer Science (JINACS) 3, no. 03 (2022): 308–14. http://dx.doi.org/10.26740/jinacs.v3n03.p308-314.
Full textRobayet, Nasim. "SECURITY THREATS ANALYSIS IN BLUETOOTH ENABLED MOBILE DEVICES." International Journal of Network Security & Its Applications (IJNSA) 4, no. 3 (2012): 41 to 56. https://doi.org/10.5281/zenodo.3360100.
Full textDissertations / Theses on the topic "MITM sniffing"
Beeretz, Stefan Georg [Verfasser], and Andreas J. [Akademischer Betreuer] Fallgatter. "Zusammenhang von Vagus Evozierten Potentialen mit Riechfunktion gemessen mit Sniffin’ Sticks / Stefan Georg Beeretz ; Betreuer: Andreas J. Fallgatter." Tübingen : Universitätsbibliothek Tübingen, 2016. http://d-nb.info/116366507X/34.
Full textMarček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Full textConference papers on the topic "MITM sniffing"
Vázquez-Naya, Jose, and Daniel Santiago-Cernadas. "Analysis of Vulnerabilities in the Automatic Reconnection of Devices to Known Wi-Fi Networks." In VII Congreso XoveTIC: impulsando el talento científico. Servizo de Publicacións. Universidade da Coruña, 2024. https://doi.org/10.17979/spudc.9788497498913.61.
Full text