{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:46:45Z","timestamp":1771613205281,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,26]]},"DOI":"10.1109\/eecsi63442.2024.10776323","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:05:11Z","timestamp":1734030311000},"page":"793-800","source":"Crossref","is-referenced-by-count":1,"title":["Client Risk Assessment in a Network: An Examination of Man-in-the-Middle Attacks and Their Usage"],"prefix":"10.1109","author":[{"given":"Sadaf","family":"Ul-Aaish","sequence":"first","affiliation":[{"name":"Information Technology Center, Sindh Agricultural University,Tando Jam,Pakistan"}]},{"given":"Ivan Miguel","family":"Pires","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Escola Superior de Tecnologia e Gest&#x00E3;o de &#x00C1;gueda, Universidade de Aveiro,&#x00C1;gueda,Portugal"}]},{"given":"Ant\u00f3nio","family":"Godinho","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of Coimbra, Technology and Management, School of Oliveira do Hospital, Oliveira do Hospital, Portugal Research Center for Arts and Communication, Santar&#x00E9;m Polytechnic University,Santar&#x00E9;m,Portugal"}]},{"given":"Paulo Jorge","family":"Coelho","sequence":"additional","affiliation":[{"name":"School University of Technology and Management, Polytechnic University of Leiria,Leiria"}]},{"given":"Pinial Khan","family":"Butt","sequence":"additional","affiliation":[{"name":"Information Technology Center, Sindh Agricultural University,Tando Jam,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967568"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3863782"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCAF.2017.8344724"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/S0217984920503662"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14257\/ijca.2017.10.7.08"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.143"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICA-ACCA.2016.7778423"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.22373\/cj.v2i2.3453"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13895"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103198"},{"issue":"5","key":"ref13","first-page":"2614","article-title":"A study on web hijacking techniques and browser attacks","volume":"13","author":"Kumar","year":"2018","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref14","article-title":"Enc-dns-http: Utilising dns infrastructure to secure web browsing","volume-title":"Security and Communication Networks","volume":"2017","author":"Hussain","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3213299.3213304"},{"key":"ref16","first-page":"1","article-title":"Lorawan-a low power wan protocol for internet of things: A review and opportunities","volume-title":"2017 2nd International multidisciplinary conference on computer and energy science (SpliTech)","author":"De Carvalho Silva"}],"event":{"name":"2024 11th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)","location":"Yogyakarta, Indonesia","start":{"date-parts":[[2024,9,26]]},"end":{"date-parts":[[2024,9,27]]}},"container-title":["2024 11th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10774563\/10776044\/10776323.pdf?arnumber=10776323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T07:00:41Z","timestamp":1734073241000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10776323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,26]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/eecsi63442.2024.10776323","relation":{},"subject":[],"published":{"date-parts":[[2024,9,26]]}}}