Showing 1 - 2 results of 2 for search '"impersonator"', query time: 0.01s Refine Results
  1. 1
    “… the standard HTTP protocol to impersonate normal web traffic and bypass the current network security systems…”
    Get full text
    Conference paper
  2. 2
    “…. Generally, session hijacking is the attack occurs to impersonate the real resource to serve the pretended…”
    Get full text
    Article
Search Tools: RSS Feed Email Search