Detecting Man-in-the-Middle Attacks by Precise Timing.
Benjamin AzizGeoff W. HamiltonPublished in: SECURWARE (2009)
Keyphrases
- network intrusion detection systems
- detect malicious
- countermeasures
- terrorist attacks
- website
- detecting malicious
- automatic detection
- security protocols
- traffic analysis
- cryptographic protocols
- chosen plaintext
- misuse detection
- attack detection
- security threats
- real time
- computer security
- intrusion detection system
- intrusion detection
- lightweight
- data mining