Artículos de revistas sobre el tema "IP spoofing"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "IP spoofing".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Thomsen, Dan. "IP spoofing and session hijacking". Network Security 1995, n.º 3 (marzo de 1995): 6–11. http://dx.doi.org/10.1016/s1353-4858(00)80045-8.
Texto completoAlqurashi, Reem K., Ohoud S. Al-harthi y Sabah M. Alzahrani. "Detection of IP Spoofing Attack". International Journal of Engineering Research and Technology 13, n.º 10 (31 de octubre de 2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.
Texto completoFonseca, Osvaldo, Italo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira y Ethan Katz-Bassett. "Identifying Networks Vulnerable to IP Spoofing". IEEE Transactions on Network and Service Management 18, n.º 3 (septiembre de 2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.
Texto completoKim, Jin. "IP Spoofing Detection Technique for Endpoint Security Enhancement". Journal of Korean Institute of Information Technology 15, n.º 8 (31 de agosto de 2017): 75–83. http://dx.doi.org/10.14801/jkiit.2017.15.8.75.
Texto completoVeeraraghavan, Prakash, Dalal Hanna y Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network". Electronics 9, n.º 9 (14 de septiembre de 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Texto completoLin, Jin Cherng, Men Jue Koo y Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection". Applied Mechanics and Materials 284-287 (enero de 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.
Texto completoKang, Jung-Ha, Yang Sun Lee, Jae Young Kim y Eun-Gi Kim. "ARP Modification for Prevention of IP Spoofing". Journal of information and communication convergence engineering 12, n.º 3 (30 de septiembre de 2014): 154–60. http://dx.doi.org/10.6109/jicce.2014.12.3.154.
Texto completoZhenhai Duan, Xin Yuan y J. Chandrashekar. "Controlling IP Spoofing through Interdomain Packet Filters". IEEE Transactions on Dependable and Secure Computing 5, n.º 1 (enero de 2008): 22–36. http://dx.doi.org/10.1109/tdsc.2007.70224.
Texto completoEhrenkranz, Toby y Jun Li. "On the state of IP spoofing defense". ACM Transactions on Internet Technology 9, n.º 2 (mayo de 2009): 1–29. http://dx.doi.org/10.1145/1516539.1516541.
Texto completoYao, Guang, Jun Bi y Peiyao Xiao. "VASE: Filtering IP spoofing traffic with agility". Computer Networks 57, n.º 1 (enero de 2013): 243–57. http://dx.doi.org/10.1016/j.comnet.2012.08.018.
Texto completoVlajic, Natalija, Mashruf Chowdhury y Marin Litoiu. "IP Spoofing In and Out of the Public Cloud: From Policy to Practice". Computers 8, n.º 4 (9 de noviembre de 2019): 81. http://dx.doi.org/10.3390/computers8040081.
Texto completoRaju, Dr K. Butchi. "A Novel IP Traceback Scheme for Spoofing Attack". International Journal of Advanced engineering, Management and Science 3, n.º 2 (2017): 1–6. http://dx.doi.org/10.24001/ijaems.3.2.1.
Texto completoSahni, Sarita y Pankaj Jagtap. "A Survey of Defence Mechanisms against IP Spoofing". IARJSET 4, n.º 7 (20 de julio de 2017): 20–27. http://dx.doi.org/10.17148/iarjset.2017.4704.
Texto completoBenson Edwin Raj, S., V. S. Jayanthi y R. Shalini. "A Novel Approach for the Early Detection and Identification of Botnets". Advanced Materials Research 403-408 (noviembre de 2011): 4469–75. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4469.
Texto completoPark, Sun-Hee, Dong-Il Yang, Kwang-Youn Jin y Hyung-Jin Choi. "A Modeling of Forensics for Mobile IP Spoofing Prevention". Journal of Korea Navigation Institute 16, n.º 2 (30 de abril de 2012): 307–17. http://dx.doi.org/10.12673/jkoni.2012.16.2.307.
Texto completoSudi Lema, Hussein. "Preventing IP Spoofing Attacks in a Shared Resources Network". International Journal of Cyber-Security and Digital Forensics 8, n.º 2 (2019): 144–51. http://dx.doi.org/10.17781/p002575.
Texto completoSudhakaran, Pradeep. "Detection of Spoofing Attacks on SDN through IP Trace Back Protocol". Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (31 de marzo de 2020): 55–61. http://dx.doi.org/10.5373/jardcs/v12sp4/20201466.
Texto completoShariff, Vahiduddin, Ruth Ramya K, B. Renuka Devi, Debnath Bhattacharyya y Tai-hoon Kim. "A survey on existing IP trace back mechanisms and their comparisons". International Journal of Engineering & Technology 7, n.º 1.9 (1 de marzo de 2018): 67. http://dx.doi.org/10.14419/ijet.v7i1.9.9972.
Texto completoBasim, Huda y Turkan Ahmed. "An Improved Strategy for Detection and Prevention IP Spoofing Attack". International Journal of Computer Applications 182, n.º 9 (14 de agosto de 2018): 28–31. http://dx.doi.org/10.5120/ijca2018917667.
Texto completoKang, Dong W., Joo H. Oh, Chae T. Im, Wan S. Yi y Yoo J. Won. "A Practical Attack on Mobile Data Network Using IP Spoofing". Applied Mathematics & Information Sciences 7, n.º 6 (1 de noviembre de 2013): 2345–53. http://dx.doi.org/10.12785/amis/070626.
Texto completoMavani, Monali y Krishna Asawa. "Modeling and analyses of IP spoofing attack in 6LoWPAN network". Computers & Security 70 (septiembre de 2017): 95–110. http://dx.doi.org/10.1016/j.cose.2017.05.004.
Texto completoSeo, Jung-Woo y Sang-Jin Lee. "A study on the detection of DDoS attack using the IP Spoofing". Journal of the Korea Institute of Information Security and Cryptology 25, n.º 1 (28 de febrero de 2015): 147–53. http://dx.doi.org/10.13089/jkiisc.2015.25.1.147.
Texto completoKIM, Tae Hwan, Dong Seong KIM y Hee Young JUNG. "Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach". IEICE Transactions on Communications E99.B, n.º 7 (2016): 1511–22. http://dx.doi.org/10.1587/transcom.2015ebp3457.
Texto completoSrinath, D., J. Janet y Jose Anand. "A Survey of Routing Instability with IP Spoofing on the Internet". Asian Journal of Information Technology 9, n.º 3 (1 de marzo de 2010): 154–58. http://dx.doi.org/10.3923/ajit.2010.154.158.
Texto completoZhang, Chaoqin, Guangwu Hu, Guolong Chen, Arun Kumar Sangaiah, Ping'an Zhang, Xia Yan y Weijin Jiang. "Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack". IEEE Access 6 (2018): 22764–77. http://dx.doi.org/10.1109/access.2017.2785236.
Texto completoKIM, M. "Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, n.º 7 (1 de julio de 2006): 1959–67. http://dx.doi.org/10.1093/ietfec/e89-a.7.1959.
Texto completoLu, XiCheng, GaoFeng Lü, PeiDong Zhu y YiJiao Chen. "MASK: An efficient mechanism to extend inter-domain IP spoofing preventions". Science in China Series F: Information Sciences 51, n.º 11 (16 de octubre de 2008): 1745–60. http://dx.doi.org/10.1007/s11432-008-0144-8.
Texto completoNarendhiran R, Pavithra K, Rakshana P, Sangeetha P. "Software Defined Based Pure VPN Protocol for Preventing IP Spoofing Attacks in IOT". International Journal on Recent and Innovation Trends in Computing and Communication 7, n.º 3 (20 de marzo de 2019): 14–20. http://dx.doi.org/10.17762/ijritcc.v7i3.5251.
Texto completoArumugam, Dr N. "A Survey of Network-Based Detection and Defense Mechanisms Countering the IP Spoofing Problems". International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (31 de agosto de 2018): 704–10. http://dx.doi.org/10.31142/ijtsrd15921.
Texto completoBhavani, Y., V. Janaki y R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback". Oriental journal of computer science and technology 10, n.º 2 (6 de junio de 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Texto completoBi, Jun, Bingyang Liu, Jianping Wu y Yan Shen. "Preventing IP source address spoofing: A two-level, state machine-based method". Tsinghua Science and Technology 14, n.º 4 (agosto de 2009): 413–22. http://dx.doi.org/10.1016/s1007-0214(09)70097-5.
Texto completoBharti, Abhishek. "Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography". IOSR Journal of Computer Engineering 13, n.º 2 (2013): 66–73. http://dx.doi.org/10.9790/0661-1326673.
Texto completoMurugan, K. y P. Varalakshmi. "IP Spoofing Attack Mitigation using Extreme Learning Machine to Promote Secure Data Transmission". Asian Journal of Research in Social Sciences and Humanities 6, n.º 6 (2016): 394. http://dx.doi.org/10.5958/2249-7315.2016.00217.3.
Texto completoArumugam, N. "A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm". IOSR Journal of Engineering 02, n.º 10 (octubre de 2012): 09–16. http://dx.doi.org/10.9790/3021-021020916.
Texto completoYaar, A., A. Perrig y D. Song. "StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense". IEEE Journal on Selected Areas in Communications 24, n.º 10 (octubre de 2006): 1853–63. http://dx.doi.org/10.1109/jsac.2006.877138.
Texto completoVelmayil, G. y S. Pannirselvam. "Detection and Removal of IP Spoofing through Extended-Inter Domain Packet Filter Architecture". International Journal of Computer Applications 49, n.º 17 (28 de julio de 2012): 37–43. http://dx.doi.org/10.5120/7723-1126.
Texto completoLopes, Paulo, Paulo Salvador y António Nogueira. "Methodologies for Network Topology Discovery and Detection of MAC and IP Spoofing Attacks". Network Protocols and Algorithms 5, n.º 3 (31 de octubre de 2013): 153. http://dx.doi.org/10.5296/npa.v5i3.4316.
Texto completoLee, Hae-Dong, Hyeon-Tae Ha, Hyun-Chul Baek, Chang-Gun Kim y Sang-Bok Kim. "Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts". Journal of the Korean Institute of Information and Communication Engineering 16, n.º 12 (31 de diciembre de 2012): 2649–56. http://dx.doi.org/10.6109/jkiice.2012.16.12.2649.
Texto completoYang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy". Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.
Texto completoRahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker y Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network". European Journal of Engineering Research and Science 4, n.º 12 (17 de diciembre de 2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.
Texto completoYang, Ru. "Study on ARP Protocol and Network Security in Digital Manufacturing". Applied Mechanics and Materials 484-485 (enero de 2014): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.191.
Texto completoSong, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong y Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.
Texto completoLi, Pengkun, Jinshu Su, Xiaofeng Wang y Qianqian Xing. "DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability". Security and Communication Networks 2021 (19 de julio de 2021): 1–17. http://dx.doi.org/10.1155/2021/1974493.
Texto completoHafizh, M. Nasir, Imam Riadi y Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic". Jurnal Telekomunikasi dan Komputer 10, n.º 2 (21 de agosto de 2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.
Texto completoZhou, Qizhao, Junqing Yu y Dong Li. "An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks". Security and Communication Networks 2021 (21 de septiembre de 2021): 1–14. http://dx.doi.org/10.1155/2021/5451820.
Texto completoNarayanan, Arumugam y Venkatesh Chakrapani. "Triangular fuzzy based classification of IP request to detect spoofing request in data network". International Journal of Physical Sciences 8, n.º 20 (30 de mayo de 2013): 1074–79. http://dx.doi.org/10.5897/ijps12.639.
Texto completoShah, Zawar y Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey". Electronics 8, n.º 10 (28 de septiembre de 2019): 1095. http://dx.doi.org/10.3390/electronics8101095.
Texto completoVelmayil, G. y S. Pannirselvam. "Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System". International Journal of Computer Network and Information Security 5, n.º 5 (16 de abril de 2013): 47–54. http://dx.doi.org/10.5815/ijcnis.2013.05.06.
Texto completoSharma, Vedna y Monika Thakur. "Analyse and Detect the IP Spoofing Attack in Web Log Files Using BPNN for Classification". International Journal of Computer Trends and Technology 42, n.º 2 (25 de diciembre de 2016): 117–23. http://dx.doi.org/10.14445/22312803/ijctt-v42p120.
Texto completoKovács, Márk, Péter András Agg y Zsolt Csaba Johanyák. "SDMN Architecture in 5G". Műszaki Tudományos Közlemények 13, n.º 1 (1 de octubre de 2020): 101–4. http://dx.doi.org/10.33894/mtk-2020.13.17.
Texto completo