Man-in-the-middle-attack: Understanding in simple words

A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover.
A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters …

A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP)

MM Naeem, I Hussain, MMS Missen - Computer Networks, 2020 - Elsevier
Today, many organizations are transforming their traditional telephone services into Voice
over Internet Protocol (VoIP) systems. These services are simple to implement, but they are …

[PDF][PDF] Understanding Man-in-the-middle-attack through Survey of Literature

A Mallik, A Ahsan, MMZ Shahadat… - Indonesian Journal of …, 2019 - pdfs.semanticscholar.org
In cryptography and PC security, a man-inthe-middle attack (MITM) is an attack where the
attacker furtively transfers and perhaps changes the correspondence between two parties …

Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety

SN Peters, N Puch, MP Heinl, P Zieris… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing digitization of modern flexible manufacturing systems has opened up new
possibilities for higher levels of automation, paving the way for innovative concepts such as …

Detection of JavaScript Injection Eavesdropping on WebRTC communications

A Osman, R Abozariba, AT Asyhari… - 2022 IEEE 23rd …, 2022 - ieeexplore.ieee.org
WebRTC is a Google-developed project that allows users to communicate directly. It is an
open-source tool supported by all major browsers. Since it does not require additional …

[PDF][PDF] Decentralized Bootstrapping for WebRTC-based P2P Networks

D Boldt, F Kaminski, S Fischer - The Fifth International Conference on …, 2017 - 72.52.166.99
Around the millennium, peer-to-peer (P2P) networks were standalone applications, where
users had to configure their firewalls properly to be able to connect to the network …

Security Analysis of IoT-based Remote Labs

N Walchatwar, A Gureja, GV Ihita… - … on Future Internet of …, 2024 - ieeexplore.ieee.org
Remote labs are online laboratories that allow users to access and interact with
experimental hardware setups remotely. They are helpful in providing practical learning …

Examining the Role of Webrtc in Enabling Real-Time Communication Security

M Sharma - … and Optimization (Trends and Future Directions) …, 2024 - ieeexplore.ieee.org
The requirement for secure and efficient remote work solutions has been increased by the
Covid-19 outbreak. One potential technology for this purpose is WebRTC, which allows real …

Improving WebRtc Security via Blockchain Based Smart Contracts

B Yilmaz, E Barak, S Ozdemir - 2020 International Symposium …, 2020 - ieeexplore.ieee.org
WebRTC (Web Real-Time Communication) is one of the most popular technologies that
provide the infrastructure for real-time data communications. Many applications used in …

[图书][B] Security Traffic Analysis Through the Lenses Of: Defenders, Attackers, and Bystanders

E Alowaisheq - 2020 - search.proquest.com
Security in a nutshell, is a prey and predator chase in which defenders such as security
companies and law enforcement agencies attempt to secure the Internet, while attackers …