共 50 条
- [1] WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1464 - 1470
- [2] On the Security of HB# against a Man-in-the-Middle Attack [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
- [3] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack [J]. 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
- [4] Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks [J]. PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 47 - 52
- [5] AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 514 - 532
- [6] Research on User Authentication Scheme against the Man-in-the-Middle Attack [J]. INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
- [7] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack [J]. THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
- [8] Man-in-the-Middle Attack in HTTP/2 [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
- [9] Man-in-the-Middle Attack to the HTTPS Protocol [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81