(1)
Aravind, B.; Murugan, D. Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols. Int. J. Comp. Sci. Eng. 2025, 7, 66-70.