Man-in-the-middle attack (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Man-in-the-middle attack" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
11th place
8th place
1st place
1st place
193rd place
152nd place
8,991st place
6,535th place
2,529th place
3,277th place
low place
low place
5,990th place
3,752nd place
low place
low place
1,686th place
1,293rd place
low place
low place
153rd place
151st place
18th place
17th place
222nd place
297th place
1,356th place
870th place
4,734th place
3,077th place
low place
low place
1,983rd place
1,330th place
207th place
136th place
69th place
59th place
low place
7,554th place
9,195th place
7,457th place
low place
low place
5th place
5th place
3,829th place
2,507th place
1,040th place
623rd place
272nd place
225th place
7,139th place
4,608th place

arxiv.org

  • Heinrich, Stuart (November 28, 2013). "Public Key Infrastructure based on Authentication of Media Attestments". arXiv:1311.7182v1 [cs.CR].

cloudflare.com

blog.cloudflare.com

  • Gabbi Fisher; Luke Valenta (March 18, 2019). "Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception". The Cloudflare Blog.

cnet.com

cyber.gov.au

doi.org

doi.org

dx.doi.org

fastcompany.com

gigaom.com

harvard.edu

ui.adsabs.harvard.edu

internetsociety.org

lifehacker.com

hackerspace.lifehacker.com

liu.se

lysator.liu.se

microsoft.com

mozilla.org

developer.mozilla.org

netresec.com

owasp.org

port.ac.uk

researchportal.port.ac.uk

privateinternetaccess.com

psu.edu

citeseerx.ist.psu.edu

semanticscholar.org

api.semanticscholar.org

stackexchange.com

crypto.stackexchange.com

techspot.com

thenextweb.com

univie.ac.at

sec.cs.univie.ac.at

usenix.org

web.archive.org

wiley.com

onlinelibrary.wiley.com

wired.com

worldcat.org

search.worldcat.org