Author:
Aldaoud Manar,Al-Abri Dawood,Al Maashri Ahmed,Kausar Firdous
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference38 articles.
1. Abri, D.A.: Detection of MITM attack in LAN environment using payload matching. In: 2015 IEEE International Conference on Industrial Technology (ICIT) (2015)
2. Akashi, S., Tong, Y.: Classification of DHCP spoofing and effectiveness of DHCP Snooping, pp. 233–238. (2019)
3. Alexander, S., Droms, R.: DHCP options and BOOTP vendor extensions. In: Network Working Group. RFC Editor: Internet Request for Comments (1997)
4. Arun, R.K.P., Selvakumar, S.: Distributed denial-of-service (DDoS) threat in collaborative environment—a survey on DDoS attack tools and traceback mechanisms. In: 2009 IEEE International Advance Computing Conference (2009)
5. Bargot, B., Kulkarni, U.: A survey of different tools and approaches for ALDDoS attack. In: 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom) (2019)
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Wireless Network Infrastructure and Security Enhancement for St. Joseph School;Proceedings of the 2023 4th Asia Service Sciences and Software Engineering Conference;2023-10-27
2. Still Computers Networking is Less Secure Than It should be, Causes and Solution;2023 International Symposium on Networks, Computers and Communications (ISNCC);2023-10-23
3. An Effective Technique to Automatically Detect and Neutralize Rogue DHCP Server;2023 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD);2023-09-21
4. Security Analysis of the Module Type Package Concept;2023 IEEE 21st International Conference on Industrial Informatics (INDIN);2023-07-18
5. An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures;2023 Biennial Symposium on Communications (BSC);2023-07-04