33   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Jadil Alsamiri and Khalid Alsubhi    
In recent years, the Internet of Vehicles (IoV) has garnered significant attention from researchers and automotive industry professionals due to its expanding range of applications and services aimed at enhancing road safety and driver/passenger comfort.... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Faeiz Alserhani and Alaa Aljared    
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Surasit Songma, Theera Sathuphan and Thanakorn Pamutha    
This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018 dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory data analysis, and data normalization procedures (min-max and Z-score) are... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton and Samuel Russ    
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a da... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Waqas Haider, Gideon Creech, Yi Xie and Jiankun Hu    
Revista: Future Internet    Formato: Electrónico

 
en línea
Waqas Haider, Gideon Creech, Yi Xie and Jiankun Hu    
The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis    
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Helmut Neuschmied, Martin Winter, Branka Stojanovic, Katharina Hofer-Schmitz, Josip Bo?ic and Ulrike Kleb    
In the face of emerging technological achievements, cyber security remains a significant issue. Despite the new possibilities that arise with such development, these do not come without a drawback. Attackers make use of the new possibilities to take adva... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mário Antunes, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado and Tiago Murteira    
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilit... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Ruohao Zhang, Jean-Philippe Condomines and Emmanuel Lochin    
The rapid development of Internet of Things (IoT) technology, together with mobile network technology, has created a never-before-seen world of interconnection, evoking research on how to make it vaster, faster, and safer. To support the ongoing fight ag... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Niraj Thapa, Zhipeng Liu, Dukka B. KC, Balakrishna Gokaraju and Kaushik Roy    
The development of robust anomaly-based network detection systems, which are preferred over static signal-based network intrusion, is vital for cybersecurity. The development of a flexible and dynamic security system is required to tackle the new attacks... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Thi-Thu-Huong Le, Yongsu Kim and Howon Kim    
The recent increase in hacks and computer network attacks around the world has intensified the need to develop better intrusion detection and prevention systems. The intrusion detection system (IDS) plays a vital role in detecting anomalies and attacks o... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Pawel Dymora and Miroslaw Mazurek    
Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The massi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Afnan Alotaibi and Murad A. Rassam    
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks befo... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rubayyi Alghamdi and Martine Bellaiche    
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastruc... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari    
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Duc-Minh Ngo, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy and Emanuel Popovici    
This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks? security has become a crucial issue. Anomaly... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ammar Alazab, Ansam Khraisat, Moutaz Alazab and Sarabjot Singh    
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal thei... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Haruna Umar Adoga and Dimitrios P. Pezaros    
Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastru... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Leyi Shi, Yang Li and Haijie Feng    
As one of the active defense technologies, the honeypot deceives the latent intruders to interact with the imitated systems or networks deployed with security mechanisms. Its modeling and performance analysis have not been well studied. In this paper, we... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »