{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:17Z","timestamp":1750307717626,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,21]],"date-time":"2009-06-21T00:00:00Z","timestamp":1245542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,21]]},"DOI":"10.1145\/1582379.1582584","type":"proceedings-article","created":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T13:38:06Z","timestamp":1249393086000},"page":"942-946","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks"],"prefix":"10.1145","author":[{"given":"Senda","family":"Hammouda","sequence":"first","affiliation":[{"name":"MEDIATRON, SUP'COM, Cit\u00e9 El Ghazela, Tunisia"}]},{"given":"Zouheir","family":"Trabelsi","sequence":"additional","affiliation":[{"name":"UAE University, CIT, Al Ain, UAE"}]}],"member":"320","published-online":{"date-parts":[[2009,6,21]]},"reference":[{"unstructured":"LBNL's Network Research Group \"Arpwatch: Ethernet Monitor Program\" http:\/\/wwwnrg.ee.lbl.gov.pht.com\/antisniff\/.  LBNL's Network Research Group \"Arpwatch: Ethernet Monitor Program\" http:\/\/wwwnrg.ee.lbl.gov.pht.com\/antisniff\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"Snort: http:\/\/www.snort.org\/.  Snort: http:\/\/www.snort.org\/.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","first-page":"66","volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003","author":"Ornaghi D.","year":"2003","unstructured":"Bruschi, D. Ornaghi , A. Rosti , E., \"S-ARP : a secure address resolution protocol \", Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003 ), Page(s): 66 -- 74 , 8--12 December 2003 , Las Vegas, NV, USATavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd. Bruschi, D. Ornaghi, A. Rosti, E., \"S-ARP: a secure address resolution protocol\", Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), Page(s): 66--74, 8--12 December 2003, Las Vegas, NV, USATavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/S1389-1286(02)00326-2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/DISCEX.2001.932219"},{"unstructured":"D. Song. dsniff: a collection of tools for network auditing and penetration testing. http:\/\/www.monkey.org\/dugsong\/dsniff accessed May 2005.  D. Song. dsniff: a collection of tools for network auditing and penetration testing. http:\/\/www.monkey.org\/dugsong\/dsniff accessed May 2005.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"26","article-title":"ARP spoofing and poisoning: Traffic tricks","volume":"56","author":"Demuth T.","year":"2005","unstructured":"T. Demuth and A. Leitner . ARP spoofing and poisoning: Traffic tricks . Linux Magazine , 56 : 26 -- 31 , July 2005 . T. Demuth and A. Leitner. ARP spoofing and poisoning: Traffic tricks. Linux Magazine, 56:26--31, July 2005.","journal-title":"Linux Magazine"},{"key":"e_1_3_2_1_8_1","volume-title":"Configure your Catalyst for a more secure layer","author":"Schluting C.","year":"2005","unstructured":"C. Schluting . Configure your Catalyst for a more secure layer 2, Jan. 2005 . &amp;lt;http:\/\/www.enterprisenetworkingplanet.com\/netsecur\/article.php\/3462211&amp;gt;. ( Last accessed April 17, 2006). C. Schluting. Configure your Catalyst for a more secure layer 2, Jan. 2005. &amp;lt;http:\/\/www.enterprisenetworkingplanet.com\/netsecur\/article.php\/3462211&amp;gt;. (Last accessed April 17, 2006)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.5555\/784590.784702"},{"key":"e_1_3_2_1_10_1","volume-title":"An Ethernet address resolution protocol or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. RFC","author":"Plummer D. C.","year":"1982","unstructured":"D. C. Plummer . An Ethernet address resolution protocol or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. RFC 826, November 1982 . D. C. Plummer. An Ethernet address resolution protocol or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. RFC 826, November 1982."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/378444.378449"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/CSAC.2004.3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/ICSNC.2006.5"}],"event":{"sponsor":["ACM Association for Computing Machinery","Wiley-Blackwell","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"acronym":"IWCMC '09","name":"IWCMC '09: 2009 International Wireless Communications and Mobile Computing Conference","location":"Leipzig Germany"},"container-title":["Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1582379.1582584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:25Z","timestamp":1750253425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,21]]},"references-count":13,"alternative-id":["10.1145\/1582379.1582584","10.1145\/1582379"],"URL":"https:\/\/doi.org\/10.1145\/1582379.1582584","relation":{},"subject":[],"published":{"date-parts":[[2009,6,21]]},"assertion":[{"value":"2009-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}