Search

Your search keyword '"DNS spoofing"' showing total 412 results

Search Constraints

Start Over You searched for: Descriptor "DNS spoofing" Remove constraint Descriptor: "DNS spoofing"
412 results on '"DNS spoofing"'

Search Results

1. Implementation of Ethical Hacking—The Importance of Protecting User and System Data

2. Preserving Privacy in Internet of Things (IoT)-Based Devices

3. Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning

4. A Formal Verification of ArpON – A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks

5. Techno-Economic Aspect of the Man-in-the-Middle Attacks

6. DNS 스푸핑을 이용한 포털 해킹과 파밍의 위험성.

7. An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDN

8. Dynamic forest of random subsets-based one-time signature-based capability enhancing security architecture for named data networking

9. Security and Privacy for Mobile Edge Caching: Challenges and Solutions

10. B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology

11. Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks

12. Thirty Years of DNS Insecurity: Current Issues and Perspectives

13. Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking

14. A wrinkle in time: a case study in DNS poisoning

15. Analysis of planes of attacks on the Blockchain system

16. Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators

17. DNS Cache Poisoning Attack: Resurrections with Side Channels

18. Let's Downgrade Let's Encrypt

19. DNS water torture detection in the data plane

20. From IP to transport and beyond

21. Exploring the Attack Surface of Blockchain: A Comprehensive Survey

22. A Demonstration of Practical DNS Attacks and their Mitigation Using DNSSEC

23. An analysis of security solutions for ARP poisoning attacks and its effects on medical computing

24. Cache Effect of Shared DNS Resolver

25. Smart collaborative distribution for privacy enhancement in moving target defense

26. DNS-over-TCP considered vulnerable

27. Exploiting Queue-driven Cache Replacement Technique for Thwarting Pollution Attack in ICN

28. Poster: Fragmentation Attacks on DNS over TCP

29. Poster: Off-path VoIP Interception Attacks

30. EDITH - A Robust Framework for Prevention of Cyber Attacks in the Covid Era

31. 웹 기반 실시간 DNS 질의 분석 시스템.

32. Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI

33. Two-Stage Classification Technique for Malicious DNS Identification

34. Domain Name System (DNS) Security

35. A Peek into the DNS Cookie Jar

36. Statistical Model Checking of Common Attack Scenarios on Blockchain

37. The Far Side of DNS Amplification: Tracing the DDoS Attack Ecosystem from the Internet Core

38. Evil Twin Attack Mitigation Techniques in 802.11 Networks

39. Detecting Malicious DNS over HTTPS Traffic Using Machine Learning

40. Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)

41. Cryptanalysis of FNV-Based Cookies

42. Intelligent-Driven Adapting Defense Against the Client-Side DNS Cache Poisoning in the Cloud

43. DNS Cache Poisoning Attack Reloaded

44. A Light-weight Mitigation Scheme on the Mole Content Poisoning Attack in NDN

45. Proposal of Anomaly Detection for DNS Attacks Based on Packets Prediction Using LSTM

46. The Research on Intelligent DNS Security

47. An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDNs

48. Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic

49. Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS Servers

50. Autopolicy: Automated Traffic Policing for Improved IoT Network Security

Catalog

Books, media, physical & digital resources