A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Efficient and secured mechanisms for data link in IoT WSNs: A literature review

MZ Hasan, Z Mohd Hanapi - Electronics, 2023 - mdpi.com
The Internet of things (IoT) and wireless sensor networks (WSNs) have been rapidly and
tremendously develo** recently as computing technologies have brought about a …

A study on security attacks in wireless sensor network

R Kaur, JK Sandhu - 2021 International conference on advance …, 2021 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is the most promising area which is widely used in the field
of military, healthcare systems, flood control, and weather forecasting system. In WSN every …

SSL strip** technique (DHCP snoo** and ARP spoofing inspection)

HAS Adjei, MT Shunhua, GK Agordzo… - 2021 23rd …, 2021 - ieeexplore.ieee.org
Detecting and preventing network attacks are necessary for network solidity as any
disruption in the network performance resulting from an attack can lead to loss of resources …

Design and analysis of data link impersonation attack for wired LAN application layer services

A ElShafee, W El-Shafai - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Impersonation attack, also known as MAC spoofing, is widespread in wireless local area
networks. Under this attack, the senders cannot control the device that listens to their traffic …

[PDF][PDF] Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments

MAI Mallick, R Nath - World Scientific News, 2024 - worldscientificnews.com
The exponential growth in internet usage has reshaped daily transactions, prompting
individuals and companies to increasingly engage in cyberspace rather than traditional real …

Seamless Connections: Harnessing Machine Learning for MAC Optimization in Home Area Networks

BM Khan, MB Kadri - Electronics, 2023 - mdpi.com
The latest technologies and communication protocols are arousing a keen interest in
automation, in which the field of home area networks is the most prominent area to work …

Analisis Efektivitas Keamanan Jaringan Layer 2: Port Security, VLAN Hop**, DHCP Snoo**

MD Nurfaishal, Y Akbar - Jurnal Indonesia: Manajemen …, 2024 - journal.stmiki.ac.id
Dalam era industri 4.0 yang ditandai oleh kemajuan jaringan komputer dan internet yang
pesat, keamanan jaringan pada Layer 2, yang merupakan bagian dari Data Link Layer …

[PDF][PDF] An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.

HI Nasser, MA Hussain - Iraqi Journal for Electrical & Electronic Engineering, 2023 - iasj.net
Abstract Address Resolution Protocol (ARP) is used to resolve a host's MAC address, given
its IP address. ARP is stateless, as there is no authentication when exchanging a MAC …