Skip to main content

Showing 1–3 of 3 results for author: TajDini, M

Searching in archive cs. Search in all archives.
.
  1. Research of Caller ID Spoofing Launch, Detection, and Defense

    Authors: Volodymyr Buriachok, Volodymyr Sokolov, Mahyar TajDini

    Abstract: Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the develo** communication fake and trick calls, bringing about significant financial trouble. Unfortunately, callerID spoofing is easy to implement but yet it is difficult to have protection against it. In addition, there… ▽ More

    Submitted 1 April, 2020; originally announced April 2020.

    ACM Class: C.2.0; C.2.1

    Journal ref: Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 7(3), 2020

  2. Results and Tools for Evaluating the Effectiveness of Focusing Systems to Improve Accessibility in Wireless Networks

    Authors: Volodymyr Astapenya, Volodymyr Sokolov, Mahyar TajDini

    Abstract: The widespread use of wireless technologies leads to an ever-increasing number of users and permanently functioning devices. However, the growth of the number of wireless users in a limited space and a limited frequency range leads to an increase in their mutual influence, which ultimately affects the throughput of wireless channels and even the performance of the system as a whole. The article pr… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

    Comments: in Ukrainian

    ACM Class: C.2.0; C.2.1

    Journal ref: Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 4, 2019

  3. Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio

    Authors: Mahyar TajDini, Volodymyr Sokolov, Volodymyr Buriachok

    Abstract: The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on Bluetooth. The paper contains the analysis of the latest scientific work in this area, provides a comparative analysis of SDRs… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    ACM Class: C.2.0; C.2.1; K.6.5

    Journal ref: Mathematics. Information Technologies. Education (MoMLeT&DS), 2019