Skip to search formSkip to main contentSkip to account menu

ARP spoofing

Known as: APR, ARP flooding, ARP poison 
In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
We present new images of Arp 220 from the Atacama Large Millimeter/submillimeter Array with the highest combination of frequency… 
Highly Cited
2011
Highly Cited
2011
It has been shown before that the high mass-to-light ratios of ultracompact dwarf galaxies (UCDs) can be explained if their… 
2010
2010
As one of powerful and light weight Network Intrusion Detection System, Snort has good expansibility and transplantability, and… 
2008
2008
  • T. Chomsiri
  • 2008
  • Corpus ID: 9806297
Identifying weak points of network systems and protecting them (before attackers or hackers detect and use our data to attack our… 
2008
2008
We report the results from our analysis of Suzaku X-ray Imaging Spectrometer (XIS) (0.5–10 keV) and Hard X-ray Detector (HXD)/PIN… 
2007
2007
ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a… 
Review
1998
Review
1998
We present here detailed results of an 18 cm VLBI survey of 31 luminous (LFIR > 1011.25 L☉), radio-compact (θ ≲ 0.″25) infrared… 
Highly Cited
1992
Highly Cited
1992
  • Toshihito Kanai
  • 1992
  • Corpus ID: 61568672
A simple, decentralized procedure for adaptive channel allocation, autonomous reuse partitioning (ARP), is proposed. Radio… 
Highly Cited
1990
Highly Cited
1990
Fast restoration of broadband optical fiber networks from multiple-link and node failures, as well as single-link failures, is… 
Highly Cited
1985
Highly Cited
1985
Two strong extragalactic OH masers have been detected in the galaxies NGC3690 and Mrk 231 which are in the same class as the…