8   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Changhong Yu, Ze Zhang and Ming Gao    
Industrial control protocol feature extraction is an important way to improve the accuracy and speed of industrial control protocol traffic classification. This paper firstly proposes a keyword feature extraction method for industrial control protocol, a... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Lopamudra Hota, Biraja Prasad Nayak, Arun Kumar, G. G. Md. Nawaz Ali and Peter Han Joo Chong    
Traffic density around the globe is increasing on a day-to-day basis, resulting in more accidents, congestion, and pollution. The dynamic vehicular environment induces challenges in designing an efficient and reliable protocol for communication. Timely d... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ahmad Reda Alzighaibi    
Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal acc... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Mauro Leonardi, Luca Di Gregorio and Davide Di Fausto    
Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance system used in Air Traffic Control. With this system, the aircraft transmits their own information (identity, position, velocity, etc.) to any equipped listener for surveillance scope. ... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Mauro Leonardi, Luca Di Gregorio and Davide Di Fausto    
Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance system used in Air Traffic Control. With this system, the aircraft transmits their own information (identity, position, velocity, etc.) to any equipped listener for surveillance scope. ... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz and Mamoun Alazab    
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qasem Abu Al-Haija and Ahmed Al-Tamimi    
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Celso A. R. L. Brennand, Rodolfo Meneguette and Geraldo P. Rocha Filho    
Congestion in large cities is widely recognized as a problem that impacts various aspects of society, including the economy and public health. To support the urban traffic system and to mitigate traffic congestion and the damage it causes, in this articl... ver más
Revista: Informatics    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »