Cont..
●[6] D. Bruschi, A. Ornaghi, and E. Rosti, “S-arp: a secure
address resolution protocol,” in Proceedings of the 19th
Annual Computer Security Applications Conference,
ACSAC ’03, (Washington, DC, USA), pp. 66–, IEEE
Computer Society, 2003.
●[7] W. Lootah, W. Enck, and P. McDaniel, “Tarp: Ticket-
based address resolution protocol,” Comput. Netw., vol. 51,
pp. 4322–4337, Oct. 2007.
●[8] Z. Trabelsi and H. Rahmani, “Detection of sniffers in an
ethernet network,” in ISC, pp. 170–182, 2004.
●[9] Z. Trabelsi and K. Shuaib, “Spoofed arp packets
detection in switched lan networks,” in SECRYPT, pp. 40–
47, 2006.
●[10] S. Y. Nam, D. Kim, and J. Kim, “Enhanced arp:
preventing arp poisoning-based man-in-the-middle
attacks,” Comm. Letters., vol. 14, pp. 187–189, Feb. 2010.