The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hijacking with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2004 (18) 2005-2006 (23) 2007 (18) 2008-2009 (21) 2010-2011 (27) 2012 (21) 2013-2014 (19) 2015-2016 (34) 2017 (18) 2018 (19) 2019 (23) 2020 (15) 2021 (25) 2022 (24) 2023 (28) 2024 (7)
Publication types (Num. hits)
article(110) book(1) incollection(3) inproceedings(224) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 93 occurrences of 75 keywords

Results
Found 340 publication records. Showing 340 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
137Mitsuho Tahara, Naoki Tateishi, Toshio Oimatsu, Souhei Majima A Method to Detect Prefix Hijacking by Using Ping Tests. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Prefix Hijacking, Ping Test, Border Gateway Protocol (BGP)
137Hitesh Ballani, Paul Francis, Xinyang Zhang A study of prefix hijacking and interception in the internet. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hijacking, routing, BGP, interception
133Fernando Sanchez, Zhenhai Duan Region-based BGP announcement filtering for improved BGP security. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF BGP security, network prefix hijacking, BGP
105Seong-Cheol Hong, Hong-Taek Ju, James W. Hong IP Prefix Hijacking Detection Using Idle Scan. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IP Prefix Hijacking, Security, Routing, BGP
94Na Wang, Yingjian Zhi, Binqiang Wang AT: An Origin Verification Mechanism Based on Assignment Track for Securing BGP. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
86Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang 0001, Paul Francis A light-weight distributed scheme for detecting ip prefix hijacks in real-time. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hijacking, routing, detection, BGP, interception
82Victor C. Zandy, Barton P. Miller, Miron Livny Process Hijacking. Search on Bibsonomy HPDC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
82Oliver Zheng, Jason Poon, Konstantin Beznosov Application-based TCP hijacking. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCP hijacking, Windows Live Messenger, application protocols, application-based TCP hijacking, packet injection
79Laura Dugan, Gary LaFree, Alex R. Piquero Testing a Rational Choice Model of Airline Hijackings. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
66Xin Hu, Zhuoqing Morley Mao Accurate Real-time Identification of IP Prefix Hijacking. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
63Alexey Smirnov 0001, Tzi-cker Chiueh Automatic Patch Generation for Buffer Overflow Attacks. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Young-joo Chung, Masashi Toyoda, Masaru Kitsuregawa Detecting Link Hijacking by Web Spammers. Search on Bibsonomy PAKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Link hijacking, Information retrieval, Link analysis, Web spam
58Toshimitsu Ooshima, Mitsuho Tahara, Ritsu Kusaba, Souhei Majima, Satoshi Tajima, Yoshinori Kawamura, Ryousuke Narita A Study of Recovering from Communication Failure Caused by Route Hijacking. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF route hijacking, communication recovery, BGP
55Kuan-Ta Chen, Li-Wen Hong User identification based on game-play activity patterns. Search on Bibsonomy NETGAMES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF account hijacking, biometrical signatures, online games, user behavior, Kullback-Leibler divergence
50Zheng Zhang 0009, Ying Zhang 0022, Y. Charlie Hu, Zhuoqing Morley Mao Practical defenses against BGP prefix hijacking. Search on Bibsonomy CoNEXT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Rupinder Gill, Jason Smith 0001, Andrew J. Clark Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF session hi-jacking, wireless intrusion detection, round trip time, received signal strength, passive monitoring
47Martin Johns SessionSafe: Implementing XSS Immune Session Handling. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Lap-Chung Lam, Tzi-cker Chiueh Automatic Extraction of Accurate Application-Specific Sandboxing Policy. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack
38Pan Wang, Xuejiao Chen Co Hijacking Monitor: Collaborative Detecting and Locating Mechanism for HTTP Spectral Hijacking. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
38Ming Yuan, Ye Li, Zhoujun Li 0001 Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. Search on Bibsonomy ICICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su 0001, Frederic T. Chong Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Mohammad Mannan, Paul C. van Oorschot Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Lap-Chung Lam, Wei Li 0020, Tzi-cker Chiueh Accurate and Automated System Call Policy-Based Intrusion Prevention. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Nai Xia, Bing Mao, Qingkai Zeng 0002, Li Xie 0001 Efficient and Practical Control Flow Monitoring for Program Security. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Program Vulnerability, Source Code Instrumentation, Static Analysis, Control Flow, Dynamic Profiling
31Kirill Levchenko, Ramamohan Paturi, George Varghese On the difficulty of scalably detecting network attacks. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF communication complexity, network intrusion detection
23Anne M. Payton A review of spyware campaigns and strategies to combat them. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware
23Marcelo Bagnulo, Alberto García-Martínez, Arturo Azcorra Efficient security for IPv6 multihoming. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hijacking protection, IPv6, multihoming
23Elias Levy Interface Illusions. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Web browser attacks, address-bar spoofing, XUL attacks, hijacking, GUI, attacks, event models
23Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Lixia Zhang 0001 Protecting BGP Routes to Top-Level DNS Servers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DNS infrastructure protection, route hijacking, BGP path filtering, Fault-tolerance
23Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang 0001 Protecting BGP Routes to Top Level DNS Servers. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DNS infrastructure protection, route hijacking, BGP path filtering, fault-tolerance
19Muteeb Bin Muzammil, Muhammad Bilal 0006, Sahar Ajmal, Sandile Charles Shongwe, Yazeed Yasin Ghadi Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Sune Dueholm Müller, Johan Ivar Sæbø The 'hijacking' of the Scandinavian Journal of Information Systems: Implications for the information systems community. Search on Bibsonomy Inf. Syst. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Yunjie Ge, Qian Wang, Huayang Huang, Qi Li 0002, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang Hijacking Attacks against Neural Networks by Analyzing Training Data. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Zhuolin Yang, Cathy Yuanchen Li, Arman Bhalla, Ben Y. Zhao, Haitao Zheng 0001 Inception Attacks: Immersive Hijacking in Virtual Reality Systems. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Ziqiang Wang, Xuewei Feng, Qi Li 0002, Kun Sun, Yuxiang Yang, Mengyuan Li, Ke Xu 0002, Jianping Wu Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Kenta Nakashima, Michiko Harayama, Miwako Mishima Detection of BGP Hijacking based on AS Hegemony. Search on Bibsonomy ICEIC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Pedro Fernández-Álvarez, Ricardo J. Rodríguez Module extraction and DLL hijacking detection via single or multiple memory dumps. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Sune Dueholm Müller, Anna Abalkina The Hijacking of the Scandinavian Journal of Information Systems. Reflections and commentary. Search on Bibsonomy Scand. J. Inf. Syst. The full citation details ... 2023 DBLP  BibTeX  RDF
19Taahir Aiyoob Patel, Clement N. Nyirenda Semi-Supervised Anomaly Detection for the Determination of Vehicle Hijacking Tweets. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Wai Man Si, Michael Backes 0001, Yang Zhang 0016, Ahmed Salem 0001 Two-in-One: A Model Hijacking Attack Against Text Generation Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ka Ho Chow, Ling Liu 0001, Wenqi Wei, Fatih Ilhan, Yanzhao Wu 0001 STDLens: Model Hijacking-Resilient Federated Learning for Object Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Joonhyun Jeong Hijacking Context in Large Multi-modal Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Derry Pratama, Jaegeun Moon, Agus Mahardika Ari Laksmono, Dongwook Yun, Iqbal Muhammad, Byeonguk Jeong, Janghyun Ji, Howon Kim 0001 Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ege Erdogan, Unat Teksen, Mehmet Salih Celiktenyildiz, Alptekin Küpçü, A. Ercüment Çiçek Defense Mechanisms Against Training-Hijacking Attacks in Split Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yao Qiang, Xiangyu Zhou, Dongxiao Zhu Hijacking Large Language Models via Adversarial In-Context Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong 0002 Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Pu Sun, Sen Chen 0001, Lingling Fan 0003, Pengfei Gao, Fu Song, Min Yang VenomAttack: automated and adaptive activity hijacking in Android. Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity, Suman Bhunia On Detecting Route Hijacking Attack in Opportunistic Mobile Networks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Felix Stöger, Anxin Zhou, Huayi Duan, Adrian Perrig Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking. Search on Bibsonomy FC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Pietro Spadaccino, Sara Bruzzese, Francesca Cuomo, Flavio Luciani Analysis and emulation of BGP hijacking events. Search on Bibsonomy NOMS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jun He, Yahui Li, Han Zhang 0009, Ming Wang, Changqing An, Jilong Wang 0001 Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public Monitors. Search on Bibsonomy ICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Xuewei Feng, Qi Li 0002, Kun Sun 0001, Yuxiang Yang, Ke Xu 0002 Traffic Hijacking in Wi-Fi Networks via ICMP Redirects. Search on Bibsonomy ACM TUR-C The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Wai Man Si, Michael Backes 0001, Yang Zhang 0016, Ahmed Salem 0001 Two-in-One: A Model Hijacking Attack Against Text Generation Models. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
19Elias Heftrig, Haya Schulmann, Michael Waidner Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
19Komail Dharsee, John Criswell Jinn: Hijacking Safe Programs with Trojans. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
19Jiayun Fu, Xiaojing Ma 0002, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu 0003, Hai Jin 0001, Dongmei Zhang 0001 Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
19Zixuan Wu, Sean Charles Ye, Byeolyi Han, Matthew C. Gombolay Hijacking Robot Teams Through Adversarial Communication. Search on Bibsonomy CoRL The full citation details ... 2023 DBLP  BibTeX  RDF
19Seungchan Woo, Jaehyoung Park, Soonhong Kwon, Kyungmin Park, Jonghyun Kim, Jong-Hyouk Lee Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network. Search on Bibsonomy EuCNC/6G Summit The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Alessandro Bertani, Marco Bonelli, Lorenzo Binosi, Michele Carminati, Stefano Zanero, Mario Polino Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ka Ho Chow, Ling Liu 0001, Wenqi Wei, Fatih Ilhan, Yanzhao Wu 0001 STDLens: Model Hijacking-Resilient Federated Learning for Object Detection. Search on Bibsonomy CVPR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Eric Bergen, Daniel Lukaszewski, Geoffrey G. Xie Data Exfiltration via Flow Hijacking at the Socket Layer. Search on Bibsonomy HICSS The full citation details ... 2023 DBLP  BibTeX  RDF
19Cyril Li, Christophe Ducottet, Sylvain Desroziers, Maxime Moreaud Less-than-One Shot 3D Segmentation Hijacking a Pre-trained Space-Time Memory Network. Search on Bibsonomy ACIVS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong 0002 Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. Search on Bibsonomy ESORICS (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri A SLAHP in the Face of DLL Search Order Hijacking. Search on Bibsonomy UbiSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Anne Gerdes The tech industry hijacking of the AI ethics research agenda and why we should reclaim it. Search on Bibsonomy Discov. Artif. Intell. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Man Zeng, Xiaohong Huang, Pei Zhang 0003, Dandan Li Understanding the impact of outsourcing mitigation against BGP prefix hijacking. Search on Bibsonomy Comput. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jiadai Wang, Jiajia Liu 0001 Location Hijacking Attack in Software-Defined Space-Air-Ground-Integrated Vehicular Network. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Petter Solnør, Øystein Volden, Kristoffer Gryte, Slobodan Petrovic, Thor I. Fossen Hijacking of unmanned surface vehicles: A demonstration of attacks and countermeasures in the field. Search on Bibsonomy J. Field Robotics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Xuewei Feng, Qi Li 0002, Kun Sun 0001, Chuanpu Fu, Ke Xu 0002 Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Tal Shapira, Yuval Shavitt AP2Vec: An Unsupervised Approach for BGP Hijacking Detection. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Grzegorz Gawron, Philip Stubbings Feature Space Hijacking Attacks against Differentially Private Split Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Taahir Aiyoob Patel, Clement N. Nyirenda A Twitter-Driven Deep Learning Mechanism for the Determination of Vehicle Hijacking Spots in Cities. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Weimin Lyu, Songzhu Zheng, Tengfei Ma 0001, Haibin Ling, Chao Chen 0012 Attention Hijacking in Trojan Transformers. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li 0003, Ryan M. Gerdes Physical Hijacking Attacks against Object Trackers. Search on Bibsonomy CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis Detecting DNS hijacking by using NetFlow data. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. Search on Bibsonomy WPES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Aversa Prentosito, McKenna Skoczen, Lauren Kahrs, Suman Bhunia Case Study on a Session Hijacking Attack: The 2021 CVS Health Data Breach. Search on Bibsonomy MobiWIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Lancheng Qin, Dan Li, Ruifeng Li, Kang Wang Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
19Xianbo Wang, Shangcheng Shi, Yikang Chen, Wing Cheong Lau PHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on Android. Search on Bibsonomy NDSS The full citation details ... 2022 DBLP  BibTeX  RDF
19Ahmed Salem 0001, Michael Backes 0001, Yang Zhang 0016 Get a Model! Model Hijacking Attack Against Machine Learning Models. Search on Bibsonomy NDSS The full citation details ... 2022 DBLP  BibTeX  RDF
19Ali Akbar Mohammadi, Rasheed Hussain, Alma Oracevic, Syed Muhammad Ahsan Raza Kazmi, Fatima Hussain, Moayad Aloqaily, Junggab Son A Novel TCP/IP Header Hijacking Attack on SDN. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Christopher Faircloth, Gavin Hartzell, Nathan Callahan, Suman Bhunia A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft. Search on Bibsonomy AIIoT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Junya Huang, Zhihua Liu, Zhongmin Zheng, Xuan Wei, Man Li, Man Jia Research and Development of Intelligent Protection Capabilities Against Internet Routing Hijacking and Leakage. Search on Bibsonomy AIIPCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Wei Ling Cheah, Hui Na Chua Detection of Social Media Hashtag Hijacking Using Dictionary-based and Machine Learning Methods. Search on Bibsonomy IICAIET The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi Autonomous Driving Model Defense Study on Hijacking Adversarial Attack. Search on Bibsonomy ICANN (4) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19John Dorsch Hijacking Epistemic Agency: How Emerging Technologies Threaten our Wellbeing as Knowers. Search on Bibsonomy AIES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc claffy, Geoffrey M. Voelker, Stefan Savage Retroactive identification of targeted DNS infrastructure hijacking. Search on Bibsonomy IMC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Pang-Wei Tsai, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal, Teck Chaw Ling SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange. Search on Bibsonomy Future Internet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Qing-Yi Fu, Hui-Ming Wang 0001 Detection of Hijacking DDoS Attack Based on Air Interface Traffic. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19I Wayan Budi Sentana, Muhammad Ikram 0001, Mohamed Ali Kâafar BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Igor Korkin Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Pavlos Sermpezis, Vasileios Kotronis, Konstantinos Arakadakis, Athena Vakali Estimating the Impact of BGP Prefix Hijacking. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Ahmed Salem 0001, Michael Backes 0001, Yang Zhang 0016 Get a Model! Model Hijacking Attack Against Machine Learning Models. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Igor Korkin Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again. Search on Bibsonomy J. Digit. Forensics Secur. Law The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Adi Farshteindiker, Rami Puzis Leadership Hijacking in Docker Swarm and Its Consequences. Search on Bibsonomy Entropy The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
19Christos Lyvas, Costas Lambrinoudakis, Dimitris Geneiatakis On Android's activity hijacking prevention. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 340 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license