Author:
Gouda Mohamed G.,Huang Chin-Tser
Subject
Computer Networks and Communications
Reference13 articles.
1. Internet Security;Atkins,1997
2. A logic of authentication;Burrows;ACM Transactions on Computer Systems,1990
3. Smoot Carl-Mitchell, John S. Quarterman, Using ARP to Implement Transparent Subnet Gateways, RFC 1027, October 1987
4. Ralph Droms, Dynamic Host Configuration Protocol, RFC 2131, March 1997
5. Ross Finlayson, Timothy Mann, Jeffrey Mogul, Marvin Theimer, A Reverse Address Resolution Protocol, RFC 903, June 1984
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Combating ARP Spoofing: Detection and Analysis Techniques;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
2. ASD: ARP Spoofing Detector Using OpenWrt;Security and Communication Networks;2022-03-29
3. A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack;IT Professional;2021-01-01
4. Agent‐based ARP cache poisoning detection in switched LAN environments;IET Networks;2019-01
5. Adaptive Network Tools and Services Network Topology Mapper;Proceedings of the 6th International Conference on Information Technology: IoT and Smart City - ICIT 2018;2018