共 50 条
- [34] Analyzing the technique of a man-in-the-middle attack based on Bluetooth [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
- [36] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
- [37] Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack [J]. 2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, : 188 - 192
- [38] Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing [J]. 2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 64 - 68
- [39] Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 263 - +
- [40] Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network [J]. 2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,