Skip to search formSkip to main contentSkip to account menu

Session hijacking

Known as: WhatsApp sniffer, Cookie hijacking, Session-stealing 
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information… 
Review
2013
Review
2013
- In today’s world the computer networks where the packets are sent over the network form client to server for getting the… 
2011
2011
A Thesis submitted at the University of Bedfordshire In partial fulfilment for the degree of Masters of Science In Computer… 
2010
2010
In Chapter 6, we complete our discussion of keeping your PHP scripts secure; here we discuss the final threat to the safety of… 
2010
2010
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to… 
2007
2007
Summary IEEE 802.11 Wireless LAN (WLAN) has gained popularity. WLANs use different security protocols like WEP, WPA and WPA2. The… 
2006
2006
The growing availability of Internet access has led to significant increase in the use of World Wide Web. If we are to design… 
2006
2006
The shell of a sheet metal door is formed of two opposed wide, shallow trough-like members each having opposed edge layers folded… 
2005
2005
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address many of the security issues… 
2000
2000
Insecurity impedes trade. Using a variant of the gravity model (the workhorse of empirical international economics) Anderson and…