Skip to search formSkip to main contentSkip to account menu

Session hijacking

Known as: WhatsApp sniffer, Cookie hijacking, Session-stealing 
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Physical layer key agreement is a new kind of schemes used to generate a shared key between pervasive and resource constrained… 
2014
2014
The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information… 
Review
2013
Review
2013
- In today’s world the computer networks where the packets are sent over the network form client to server for getting the… 
2011
2011
A Thesis submitted at the University of Bedfordshire In partial fulfilment for the degree of Masters of Science In Computer… 
2011
2011
Many web applications are vulnerable to session hijacking attacks due to the insecure use of cookies for session management. The… 
2010
2010
In Chapter 6, we complete our discussion of keeping your PHP scripts secure; here we discuss the final threat to the safety of… 
2010
2010
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to… 
2006
2006
This paper examines the question of how a linguistic analysis of a written document can contribute to identifying, tracking and… 
2000
2000
Insecurity impedes trade. Using a variant of the gravity model (the workhorse of empirical international economics) Anderson and…