IoT and Man-in-the-Middle Attacks.
Hamidreza FereidouniOlga FadeitchevaMehdi ZalaiPublished in: CoRR (2023)
Keyphrases
- security problems
- countermeasures
- malicious attacks
- management system
- security mechanisms
- cloud computing
- watermarking algorithm
- watermarking scheme
- location information
- computer security
- security threats
- traffic analysis
- malicious users
- security issues
- big data
- ddos attacks
- cryptographic protocols
- computer networks
- intrusion detection
- terrorist attacks
- digital image watermarking