Journal articles on the topic 'MITM sniffing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 journal articles for your research on the topic 'MITM sniffing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ajharie, Mohamad Arie, and Mulia Sulistiyono. "IMPLEMENTASI FRAMEWORK MITM (MAN IN THE MIDDLE ATTACK) UNTUK MEMANTAU AKTIFITAS PENGGUNA DALAM SATU JARINGAN." Jurnal Infomedia 7, no. 1 (2022): 45. http://dx.doi.org/10.30811/jim.v7i1.2966.
Full textChliah, Mouhcine, Ghizlane Orhanou, and Said El Hajji. "Countering MitM Attacks Using Evolved PathFinder Algorithm." International Journal of Cloud Applications and Computing 7, no. 2 (2017): 41–61. http://dx.doi.org/10.4018/ijcac.2017040104.
Full textB., Prabadevi, and Jeyanthi N. "A Review on Various Sniffing Attacks and its Mitigation Techniques." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1117–25. https://doi.org/10.11591/ijeecs.v12.i3.pp1117-1125.
Full textAbdinurova, N., D. Akmyrza, and A. Mirash. "MITM. WHAT IS IT, HOW TO PROTECT YOURSELF ANDIMPLEMENTATION FOR INSTRUCTIONAL USE." Suleyman Demirel University Bulletin Natural and Technical Sciences 56, no. 3 (2021): 28–35. https://doi.org/10.47344/sdubnts.v56i3.612.
Full textArianto, Ilham Gumeraruloh, Wina Witanti, and Herdi Ashaury. "Sistem Keamanan Otentikasi Pengguna Pada Modul Single Sign On Menggunakan OAuth 2.0 dan One Time Password." Jurnal Ilmu Komputer dan Teknologi 6, no. 1 (2025): 25–31. https://doi.org/10.35960/ikomti.v6i1.1768.
Full textPrabadevi, B., and N. Jeyanthi. "A Review on Various Sniffing Attacks and its Mitigation Techniques." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1117. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1117-1125.
Full textShaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.
Full textR, Santhakumar, Keerthana R, Madhubala S, and Dr Thamizh Selvam D. "Session Hijacking in Cybersecurity: Threats, Prevention Strategies, and Future Directions." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft029.
Full textRahman Ismansyah Putra, Muhammad Arief, and Agus Prihanto. "Analisis Keamanan Data Pada Aplikasi Android Menggunakan HTTP Canary (Studi Kasus : Siakadu UNESA Mobile)." Journal of Informatics and Computer Science (JINACS) 3, no. 03 (2022): 308–14. http://dx.doi.org/10.26740/jinacs.v3n03.p308-314.
Full textRobayet, Nasim. "SECURITY THREATS ANALYSIS IN BLUETOOTH ENABLED MOBILE DEVICES." International Journal of Network Security & Its Applications (IJNSA) 4, no. 3 (2012): 41 to 56. https://doi.org/10.5281/zenodo.3360100.
Full textPurnamasari, Dian Neipa, Amang Sudarsono, and Prima Kristalina. "Modifikasi Identity-based Encryption pada Keamanan dan Kerahasiaan Data Rekam Medis." INOVTEK POLBENG 9, no. 2 (2019): 196. http://dx.doi.org/10.35314/ip.v9i2.1005.
Full textMuhammad fauzi pulungan. "Penerapan Dns Over Https Dan Arp Spoofing Dalam Upaya Meningkatkan Keamanan Jaringan Di Lingkungan Cafe." JOURNAL ZETROEM 7, no. 1 (2025): 27–31. https://doi.org/10.36526/ztr.v7i1.4414.
Full textKamarudin, Nur Khairani, Nur Syafiqa Bismi, Nurul Hidayah Ahmad Zukri, Mohd Faris Mohd Fuzi, and Rashidah Ramle. "Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger." Journal of Computing Research and Innovation 5, no. 2 (2020): 21–27. http://dx.doi.org/10.24191/jcrinn.v5i2.136.
Full textEl-Taj, Dr. Homam, and Lamar Miralam. "Network sniffing and its consequences: a comprehensive survey." July 16, 2024. https://doi.org/10.5281/zenodo.12750104.
Full textHiba, Imad Nasser, and Abdulridha Hussain Mohammed. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." August 1, 2022. https://doi.org/10.11591/eei.v11i4.3810.
Full text