Search

Your search keyword '"MAC spoofing"' showing total 49 results

Search Constraints

Start Over You searched for: Descriptor "MAC spoofing" Remove constraint Descriptor: "MAC spoofing"
49 results on '"MAC spoofing"'

Search Results

1. Toward Secure and Resilient Networks: A Zero-Trust Security Framework with Quantum Fingerprinting for Devices Accessing Network.

2. Over-the-Air Runtime Wi-Fi MAC Address Re-randomization

3. Reliable Monitoring Security System to Prevent MAC Spoofing in Ubiquitous Wireless Network

4. Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic.

5. Automating MAC Spoofer Evidence Gathering and Encoding for Investigations

9. Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic

11. AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller

12. An intelligent approach for dynamic network traffic restriction using MAC address verification

13. Security at the Application Layer and the Physical Layer in 5G

14. Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack

15. NETWORK SECURITY PROBLEMS ON LAYER 2.

16. IISR: A Secure Router for IoT Networks

17. MAC Spoofing Attack Detection Based on Physical Layer Characteristics in Wireless Networks

18. Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement

19. Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

20. Detection of MAC Spoofing Attacks in IEEE 802.11 Networks Using Signal Strength from Attackers’ Devices

21. Virtual MAC Spoofing Detection through Deep Learning

22. A New Technique for Protecting Server Against MAC Spoofing via Software Attestation

23. Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack

24. A survey on sniffing attacks on computer networks

25. Teasers on Various Spoofing Attacks

26. Analysis on Manipulation of the MAC Address and Consequent Security Threats

27. Detection and prevention of ARP poisoning in dynamic IP configuration

28. Designing a Secure Network Interface By Thwarting Mac Spoofing Attacks

29. Intelligent detection of MAC spoofing attack in 802.11 network

30. A review paper on spoofing detection methods in wireless LAN

31. Multi-factor User Authentication on Group Communication

32. Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network

33. Wireless LAN (WLAN) spoofing detection methods - Analysis and the victim Silent case

34. Artículo Científico - Estado del arte en la detección de intrusiones en Redes 802.11

35. Study of thwarting DoS attacks by detecting MAC spoof in WLAN infrastructure networks

36. Network simulation for MAC spoofing detection, using DTF method

37. An Active Host-Based Detection Mechanism for ARP-Related Attacks

38. An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks

39. Using Power Hopping to Counter MAC Spoof Attacks in WLAN

40. Enhancement of Passive MAC Spoofing Detection Techniques

41. Laboratory design for wireless network attacks

42. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength

43. Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks

44. WIDS

45. Toward Automated MAC Spoofer Investigations

46. Non-cryptographic methods of MAC spoof detection in wireless LAN

47. An Integrated Scheme for Intrusion Detection in WLAN

48. Sequence Number-Based MAC Address Spoof Detection

49. Methodologies for Network Topology Discovery and Detection of MAC and IP Spoofing Attacks

Catalog

Books, media, physical & digital resources