EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"MITM"
Narrow search

Narrow search

Year of publication
Subject
All
MITM 2 Aadhar Number 1 Anomaly Detection 1 Attack Detection 1 Certificate Authority (CA) 1 Computer Security 1 DOS/DDOS 1 Framework 1 Graph Theory 1 Host Based IDS 1 IP Spoofing 1 Intrusion Detection System (IDS) 1 MitM 1 Multiple Signature 1 Network Based 1 Network Security 1 Packet Analysis 1 Root CA 1 Routing 1 Security 1 Sniffing 1 Threat Analysis 1 Wireshark 1 pathFinder 1
more ... less ...
Online availability
All
Undetermined 3
Type of publication
All
Article 3
Language
All
English 3
Author
All
Athavale, Nachiket 1 Barde, S. S. 1 Chaudhary, Vikash 1 Chavan, Jatin 1 Chliah, Mouhcine 1 Deshpande, Shubham 1 El Hajji, Said 1 Kumar, Anil 1 Orhanou, Ghizlane 1 Tanwar, Sarvesh 1
more ... less ...
Published in...
All
International Journal of Cloud Applications and Computing (IJCAC) 1 International Journal of Information Security and Privacy (IJISP) 1 International Journal of Synthetic Emotions (IJSE) 1
Source
All
Other ZBW resources 3
Showing 1 - 3 of 3
Cover Image
Countering MitM Attacks Using Evolved PathFinder Algorithm
Chliah, Mouhcine; Orhanou, Ghizlane; El Hajji, Said - In: International Journal of Cloud Applications and … 7 (2017) 2, pp. 41-61
In this paper, we focus on attacks based on sniffing like MitM, and how to counter them from the network layer …
Persistent link: https://www.econbiz.de/10012043375
Saved in:
Cover Image
A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority
Tanwar, Sarvesh; Kumar, Anil - In: International Journal of Information Security and … 11 (2017) 3, pp. 1-14
PKI offers authentication via digital certificates, which are signed and provided by Certificate Authority (CA). A certificate can be signed by single CA or multiple CAs. A document signed by multiple CAs has less probability to be forged as compared to signed by a single CA. CA is a single...
Persistent link: https://www.econbiz.de/10012045694
Saved in:
Cover Image
Framework for Threat Analysis and Attack Modelling of Network Security Protocols
Athavale, Nachiket; Deshpande, Shubham; Chaudhary, Vikash; … - In: International Journal of Synthetic Emotions (IJSE) 8 (2017) 2, pp. 62-75
Nowadays everything is computerized including banking and personal records. Also, to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance...
Persistent link: https://www.econbiz.de/10012047574
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...