نتایج جستجو برای: middle mitm

تعداد نتایج: 155067  

2014
J. ZHANG L. SANKAR K. HEDMAN

The electric grid is a complex physically distributed and inter-connected network managed by a large number of entities (e.g., systems operators, utilities) to ensure reliable transmission, generation, and distribution of power. Sustained and reliable operation with dynamic situational awareness in the grid requires continued data sharing amongst the grid entities. Lack of automated communicati...

Journal: :Electronics 2022

Industrial control systems (ICSs) for critical infrastructure are extensively utilized to provide the fundamental functions of society and frequently employed in infrastructure. Therefore, security these from cyberattacks is essential. Over years, several proposals have been made various types cyberattack detection systems, with each concept using a distinct set processes methodologies. However...

Journal: :Lecture Notes in Computer Science 2021

The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the resistance of many hash functions, including but not limited to full MD5, HAVAL, and Tiger, reduced SHA-0/1/2. It was also shown be a threat functions built on block ciphers like AES by Sasaki 2011. Recently, such attacks hashing modes evolved from merely using freedom choosing internal state exploiting message st...

Journal: :Electronics 2021

Several wireless devices and applications can be connected through communication technologies to exchange data in future intelligent health systems (e.g., the Internet of Medical Things (IoMT)). Smart healthcare requires ample bandwidth, reliable effective communications networks, energy-efficient operations, quality service support (QoS). Healthcare providers host multi-servers ensure seamless...

Journal: :IEEE Access 2023

Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive services. gained researchers’ interest as it offers communication large bandwidth, high throughput, data transmission, greater signal gain. eliminates the idea cell boundary in reduces frequent handover inter-cell...

2017
Alok Pandey Jatinderkumar R. Saini

Much attention needs to be paid to different types of security threats and related attacks in the LAN and the interconnected environment. A variety of controls and counter mechanisms covering different layers of TCP/IP protocol suite are already available. But most of them have several issues related to cost, compatibility, interoperability, manageability, effectiveness etc. and hence multiple ...

Journal: :Security and Communication Networks 2021

The train communication Ethernet (TCE) of modern intelligent trains is under an ever-increasing threat serious network attacks. Denial service (DoS) and man in the middle (MITM), two most destructive attacks against TCE, are difficult to detect by conventional methods. Aiming at their highly time-correlated properties, a novel dynamic temporal convolutional network-based intrusion detection sys...

Journal: :IEEE Access 2021

This paper presents a unique security approach for detecting cyber-attacks against embedded systems (ESs). The proposed has been shaped within an architectural framework called anomalous resource consumption detection (ARCD). approach’s mechanism detects by distinguishing performance and patterns from pre-determinable reference model. defense of this acts as additional layer protection ESs. tec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید