Skip to search formSkip to main contentSkip to account menu

ARP spoofing

Known as: APR, ARP flooding, ARP poison 
In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Item recommendation is a personalized ranking task. To this end, many recommender systems optimize models with pairwise ranking… 
Highly Cited
2009
Highly Cited
2009
Star formation is slow in the sense that the gas consumption time is much longer than the dynamical time. It is also inefficient… 
Highly Cited
2009
Highly Cited
2009
We have recently completed a 64-night spectroscopic monitoring campaign at the Lick Observatory 3-m Shane telescope with the aim… 
2008
2008
  • T. Chomsiri
  • 2008
  • Corpus ID: 9806297
Identifying weak points of network systems and protecting them (before attackers or hackers detect and use our data to attack our… 
Highly Cited
2007
Highly Cited
2007
We combine the stellar spectral synthesis code Starburst99, the nebular modeling code MAPPINGS III and a one-dimensional… 
Highly Cited
2005
Highly Cited
2005
The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity… 
Review
2005
Review
2005
We present integrated optical spectrophotometry for a sample of 417 nearby galaxies. Our observations consist of spatially… 
Highly Cited
2003
Highly Cited
2003
Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the… 
Review
1997
Review
1997
This theory can explain why bank debt is universally senior, consistent with the presence of conflict lawyers) and absolute… 
Highly Cited
1991
Highly Cited
1991
A variety of anomalous geomorphological features on Mars can be explained by a conceptual scheme involving episodic ocean and ice…