AI in Combatting Man-in-the-Middle Attacks: A Comprehensive Review

N Mohamed, AA Ahmed - 2024 15th International Conference …, 2024 - ieeexplore.ieee.org
In the evolving landscape of cybersecurity, Man-in-the-Middle (MitM) attacks represent a
significant and persistent threat, capable of intercepting and manipulating digital …

Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach

F Mvah, VK Tchendji, CT Djamegni, AH Anwar… - Computers & …, 2024 - Elsevier
Abstract The Address Resolution Protocol (ARP) spoofing is a form of attack typically used
by attackers to cause a denial of service or man-in-the-middle attacks. This attack comes …

[PDF][PDF] A lightweight and secure multilayer authentication scheme for wireless body area networks in healthcare system

M Fareed, AA Yassin - Int. J. Electr. Comput. Eng., 2023 - academia.edu
Wireless body area networks (WBANs) have lately been combined with different healthcare
equipment to monitor patients' health status and communicate information with their …

A Novel Mechanism for Detection of Address Resolution Protocol Spoofing Attacks in Large-Scale Software-Defined Networks

L Patrice, R Sinde, J Leo - IEEE Access, 2024 - ieeexplore.ieee.org
Address Resolution Protocol (ARP) spoofing has been a long-standing problem with no
clear remedy until now. The attacks can be launched easily utilizing an enormous number of …

Developing Web-Based Application for QR Code Digital Signatures using OpenSSL

FB Muzakkir, HA Darwito… - 2024 International …, 2024 - ieeexplore.ieee.org
Despite advancements in technology, many work-related activities still require signature
verification. Digital signature technology offers a suitable solution that can be implemented …

Analisis Efektivitas Keamanan Jaringan Layer 2: Port Security, VLAN Hopping, DHCP Snooping

MD Nurfaishal, Y Akbar - Jurnal Indonesia: Manajemen …, 2024 - journal.stmiki.ac.id
Dalam era industri 4.0 yang ditandai oleh kemajuan jaringan komputer dan internet yang
pesat, keamanan jaringan pada Layer 2, yang merupakan bagian dari Data Link Layer …

Blockchain-Based CCTV Surveillance Cameras for Oil and Gas Industry Pipelines

NA Alshuraify, AA Yassin, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
The oil and gas industry is the main source of energy needed to meet the growing global
energy demand and such an industry suffers from obstacles whether on the information …

Hyperledger Fabric Blockchain Using CCTV Surveillance Cameras for Pipelines of Oil and Gas Fields

NA Alshuraify, AA Yassin… - 2024 11th International …, 2024 - ieeexplore.ieee.org
The oil and gas industry represents the beating heart of life in the world. These industries
suffer from risks of unsustainability, whether they exist in infrastructure such as pipeline oil …

[PDF][PDF] Blockchain-based Authentication Scheme in Oil and Gas Industry Data with Thermal CCTV Cameras Applications to Mitigate Sybil and 51% Cyber Attacks.

A Alshuraify, AA Yassin, ZA Abduljabbar… - … Journal of Intelligent …, 2024 - researchgate.net
Oil and gas fields represent the backbone of industries. Such industries are exposed to
many physical risks, such as sabotage and oil and gas leaks, theft of equipment, and …

Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review

S Yavuz, E Naroska, K Daniel - 2024 IEEE Conference on …, 2024 - ieeexplore.ieee.org
The security of IoT (Internet of Things) devices and the protection of sensitive information
processed by these devices such as personal data, sensor values, process-related …