Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,535 papers from all fields of science
Search
Sign In
Create Free Account
Bagoes
Known as:
Ettercap (computing)
Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network analysis and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
ArpON - ARP handler inspection
Border Gateway Protocol
CMake
Client (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Command line and Graphical interface comparative analysis for ARP Poisoning through Ettercap
S. Prudhviraj
,
C. Sudha
International Journal of Computer Science and…
2018
Corpus ID: 59539335
2018
2018
A framework to mitigate ARP sniffing attacks by cache poisoning
B. Prabadevi
,
N. Jeyanthi
Int. J. Adv. Intell. Paradigms
2018
Corpus ID: 46776587
Today in the digital era of computing, most of the network attacks are caused by sniffing the sensitive data over the network…
Expand
2018
2018
THE YOUTH RESPONSE TOWARDS SOCIAL MARKETING CAMPAIGN OF “INDONESIA PLASTIC BAG DIET MOVEMENT”
Ridha Amalia Rizki
,
Reza Saputra
2018
Corpus ID: 169635369
The consumption of plastic bag in Indonesia has already become daily intake habit –very huge and uncontrollable. Unfortunately…
Expand
2017
2017
A solution for ARP spoofing: Layer-2 MAC and protocol filtering and arpserver
Yüksel Arslan
arXiv.org
2017
Corpus ID: 32521931
Most attacks are launched inside the companies by the employees of the same company. These kinds of attacks are generally against…
Expand
2016
2016
ANTI-HYPERCHOLESTEROLEMIA ACTIVITY OF ETHANOL EXTRACT Peperomia pellucid
Chasanah Mazroatul
,
Glar Donia Deni
,
N. Habibi
,
G. Saputri
2016
Corpus ID: 87279347
Hypercholesterolemia is a major cause of cardiovascular disease such as coronary heart disease. Betel water (Peperomia pellucida…
Expand
Highly Cited
2015
Highly Cited
2015
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations
Boojoong Kang
,
P. Maynard
,
+5 authors
T. Strasser
IEEE 20th Conference on Emerging Technologies…
2015
Corpus ID: 1871655
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found…
Expand
2013
2013
Security of learning management systems
Y. Demirci
2013
Corpus ID: 60157209
............................................................................................................... iii ÖZ…
Expand
2007
2007
Penetration Tester's Open Source Toolkit, Volume 2
Christopher C. Hurley
2007
Corpus ID: 196107668
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to…
Expand
Review
2005
Review
2005
Securing Layer 2 in Local Area Networks
H. Altunbasak
,
S. Krasser
,
H. Owen
,
J. Grimminger
,
Hans-Peter Huth
,
J. Sokol
Information-Centric Networking
2005
Corpus ID: 1575124
Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data…
Expand
1978
1978
Circulation in the context of total mobility in Southeast Asia
S. Goldstein
1978
Corpus ID: 56386222
J Urbanization in Southeast Asia 3 Sources and limitations of data 7 Studies of population movement 16
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE