Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,027,372 papers from all fields of science
Search
Sign In
Create Free Account
Session hijacking
Known as:
WhatsApp sniffer
, Cookie hijacking
, Session-stealing
Expand
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
ARP spoofing
Application security
ArpON - ARP handler inspection
CRIME
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems
Stephen Brako Oti
,
J. B. Hayfron-Acquah
2014
Corpus ID: 56378099
The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information…
Expand
Review
2013
Review
2013
A Review on Detection of Session Hijacking and Ip Spoofing
A. Bharti
,
Maggi Goyal
,
M. Chaudhary
2013
Corpus ID: 212548618
- In today’s world the computer networks where the packets are sent over the network form client to server for getting the…
Expand
2011
2011
Detection of session hijacking
J. Louis
2011
Corpus ID: 62123275
A Thesis submitted at the University of Bedfordshire In partial fulfilment for the degree of Masters of Science In Computer…
Expand
2010
2010
Preventing Session Hijacking
C. Snyder
,
Thomas Myer
,
M. Southwell
2010
Corpus ID: 58113658
In Chapter 6, we complete our discussion of keeping your PHP scripts secure; here we discuss the final threat to the safety of…
Expand
2010
2010
Empowering users against sidejacking attacks
Ryan D. Riley
,
N. M. Ali
,
Kholoud Saleh Al-Senaidi
,
Aisha Lahdan Al-Kuwari
Conference on Applications, Technologies…
2010
Corpus ID: 10880229
SideJacking occurs when an attacker intercepts a session cookie and uses it to impersonate a user and gain unauthorized access to…
Expand
2007
2007
Security Improvement for Management Frames in IEEE 802.11 Wireless Networks
Mina Malekzadeh
,
A. Ghani
,
Z. Zulkarnain
,
Zaiton Muda
2007
Corpus ID: 16892023
Summary IEEE 802.11 Wireless LAN (WLAN) has gained popularity. WLANs use different security protocols like WEP, WPA and WPA2. The…
Expand
2006
2006
Empirical Characterization of Session–Based Workload and Reliability for Web Servers
K. Goseva-Popstojanova
,
A. Singh
,
Sunil Mazimdar
,
Fengbin Li
Empirical Software Engineering
2006
Corpus ID: 2146771
The growing availability of Internet access has led to significant increase in the use of World Wide Web. If we are to design…
Expand
2006
2006
Spyware Resistant Web Authentication using Virtual Machines
Collin Jackson
,
D. Boneh
,
John C. Mitchell
2006
Corpus ID: 1936469
The shell of a sheet metal door is formed of two opposed wide, shallow trough-like members each having opposed edge layers folded…
Expand
2005
2005
Passive Techniques for Detecting Session Hijacking Attacks in IEEE 802.11 Wireless Networks
R. Gill
,
Jason Smith
,
M. Looi
,
Andrew C. Clark
2005
Corpus ID: 214391
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address many of the security issues…
Expand
2000
2000
Hijacking, Hold-Up, and International Trade
Douglas Marcouiller
,
Juan Marcelo Casas
2000
Corpus ID: 96469394
Insecurity impedes trade. Using a variant of the gravity model (the workhorse of empirical international economics) Anderson and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE