|
Volumn 5, Issue , 2010, Pages 491-495
|
Different flavours of Man-In-The-Middle attack, consequences and feasible solutions
|
Author keywords
Attacker; DNS; DoS; Feasible solution; Gateway; MITM; Packet; Victim; Vulnerability
|
Indexed keywords
ATTACKER;
DNS;
FEASIBLE SOLUTION;
GATEWAY;
MITM;
PACKET;
VICTIM;
VULNERABILITY;
COMPUTER CRIME;
COMPUTER SCIENCE;
INFORMATION TECHNOLOGY;
INTERNET PROTOCOLS;
PERSONAL COMPUTING;
GATEWAYS (COMPUTER NETWORKS);
|
EID: 77958541036
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICCSIT.2010.5563900 Document Type: Conference Paper |
Times cited : (61)
|
References (10)
|