Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,418,176 papers from all fields of science
Search
Sign In
Create Free Account
Session hijacking
Known as:
WhatsApp sniffer
, Cookie hijacking
, Session-stealing
Expand
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
ARP spoofing
Application security
ArpON - ARP handler inspection
CRIME
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems
Gandeva Bayu Satrya
,
Soo Young Shin
Physical Communication
2019
Corpus ID: 69533340
2017
2017
A session hijacking attack on physical layer key generation agreement
Qiao Hu
,
G. Hancke
International Conference on Industrial Technology
2017
Corpus ID: 24756695
Physical layer key agreement is a new kind of schemes used to generate a shared key between pervasive and resource constrained…
Expand
2014
2014
Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems
Stephen Brako Oti
,
J. B. Hayfron-Acquah
2014
Corpus ID: 56378099
The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information…
Expand
Review
2013
Review
2013
A Review on Detection of Session Hijacking and Ip Spoofing
A. Bharti
,
Maggi Goyal
,
M. Chaudhary
2013
Corpus ID: 212548618
- In today’s world the computer networks where the packets are sent over the network form client to server for getting the…
Expand
2011
2011
Detection of session hijacking
J. Louis
2011
Corpus ID: 62123275
A Thesis submitted at the University of Bedfordshire In partial fulfilment for the degree of Masters of Science In Computer…
Expand
2011
2011
One-Time Cookies: Preventing Session Hijacking Attacks with Disposable Credentials
Italo Dacosta
,
Saurabh Chakradeo
,
M. Ahamad
,
Patrick Traynor
2011
Corpus ID: 14839690
Many web applications are vulnerable to session hijacking attacks due to the insecure use of cookies for session management. The…
Expand
2010
2010
Preventing Session Hijacking
C. Snyder
,
Thomas Myer
,
M. Southwell
2010
Corpus ID: 58113658
In Chapter 6, we complete our discussion of keeping your PHP scripts secure; here we discuss the final threat to the safety of…
Expand
2010
2010
Empowering users against sidejacking attacks
Ryan D. Riley
,
N. M. Ali
,
Kholoud Saleh Al-Senaidi
,
Aisha Lahdan Al-Kuwari
Conference on Applications, Technologies…
2010
Corpus ID: 10880229
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to…
Expand
2006
2006
What can linguistics contribute to event extraction
C. Fillmore
,
S. Narayanan
,
Collin F. Baker
2006
Corpus ID: 7991378
This paper examines the question of how a linguistic analysis of a written document can contribute to identifying, tracking and…
Expand
2000
2000
Hijacking, Hold-Up, and International Trade
Douglas Marcouiller
,
Juan Marcelo Casas
2000
Corpus ID: 96469394
Insecurity impedes trade. Using a variant of the gravity model (the workhorse of empirical international economics) Anderson and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE