Search

Your search keyword '"DNS spoofing"' showing total 380 results

Search Constraints

Start Over You searched for: Descriptor "DNS spoofing" Remove constraint Descriptor: "DNS spoofing" Language undetermined Remove constraint Language: undetermined
380 results on '"DNS spoofing"'

Search Results

1. Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning

2. A Formal Verification of ArpON – A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks

3. An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDN

4. Dynamic forest of random subsets-based one-time signature-based capability enhancing security architecture for named data networking

5. Security and Privacy for Mobile Edge Caching: Challenges and Solutions

6. B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology

7. Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks

8. Thirty Years of DNS Insecurity: Current Issues and Perspectives

9. Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking

10. A wrinkle in time: a case study in DNS poisoning

11. Analysis of planes of attacks on the Blockchain system

12. DNS Cache Poisoning Attack: Resurrections with Side Channels

13. Let's Downgrade Let's Encrypt

14. Exploring the Attack Surface of Blockchain: A Comprehensive Survey

15. A Demonstration of Practical DNS Attacks and their Mitigation Using DNSSEC

16. An analysis of security solutions for ARP poisoning attacks and its effects on medical computing

17. Cache Effect of Shared DNS Resolver

18. Smart collaborative distribution for privacy enhancement in moving target defense

19. DNS water torture detection in the data plane

20. From IP to transport and beyond

21. DNS-over-TCP considered vulnerable

22. Exploiting Queue-driven Cache Replacement Technique for Thwarting Pollution Attack in ICN

23. Poster: Fragmentation Attacks on DNS over TCP

24. Poster: Off-path VoIP Interception Attacks

25. EDITH - A Robust Framework for Prevention of Cyber Attacks in the Covid Era

26. Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI

27. Two-Stage Classification Technique for Malicious DNS Identification

28. Domain Name System (DNS) Security

29. A Peek into the DNS Cookie Jar

30. Statistical Model Checking of Common Attack Scenarios on Blockchain

31. The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core

32. Evil Twin Attack Mitigation Techniques in 802.11 Networks

33. Detecting Malicious DNS over HTTPS Traffic Using Machine Learning

34. Cryptanalysis of FNV-Based Cookies

35. Intelligent-Driven Adapting Defense Against the Client-Side DNS Cache Poisoning in the Cloud

36. DNS Cache Poisoning Attack Reloaded

37. A Light-weight Mitigation Scheme on the Mole Content Poisoning Attack in NDN

38. Proposal of Anomaly Detection for DNS Attacks Based on Packets Prediction Using LSTM

39. The Research on Intelligent DNS Security

40. An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDNs

41. Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic

42. Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS Servers

43. Multi-vNIC Intelligent Mutation: A Moving Target Defense to thwart Client-side DNS Cache Attack

44. Agent‐based ARP cache poisoning detection in switched LAN environments

45. Discovering Public Wi-Fi Vulnerabilities Using Raspberry pi and Kali Linux

46. A trust-based method for mitigating cache poisoning in Name Data Networking

47. Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir

48. Methodology for DNS Cache Poisoning Vulnerability Analysis of DNS64 Implementations

49. Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis

50. Development of protection mechanisms against DRDoS-attacks and combined DRDoS-attacks

Catalog

Books, media, physical & digital resources