|
|
|
Fazar Dawamsyach,Ikhwan Ruslianto,Uray Ristian
Pág. 149 - 161
Server security is an important thing that must be considered so that the server can work well and serve users. Attacks on servers can threaten server performance and data security in it. According to the National Cyber and Crypto Agency 2020 report, por...
ver más
|
|
|
|
|
|
|
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule and Cosmas Ifeanyi Nwakanma
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ...
ver más
|
|
|
|
|
|
|
Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that ...
ver más
|
|
|
|
|
|
|
Firas Najjar, Qusay Bsoul and Hasan Al-Refai
Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on t...
ver más
|
|
|
|
|
|
|
Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang and Zhuming Bi
Speaker verification systems use human voices as an important biometric to identify legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart homes against illegal access. Recent studies have demonstrated that speaker ve...
ver más
|
|
|
|
|
|
|
Shaked Delarea and Yossi Oren
Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a maliciou...
ver más
|
|
|
|
|
|
|
Zhirui Luo, Qingqing Li and Jun Zheng
Transfer learning using pre-trained deep neural networks (DNNs) has been widely used for plant disease identification recently. However, pre-trained DNNs are susceptible to adversarial attacks which generate adversarial samples causing DNN models to make...
ver más
|
|
|
|
|
|
|
Yuvaraj D,Sivaram M,A. Mohamed Uvaze Ahamed,Nageswari S
Pág. pp. 71 - 88
With advancements in device and communication technologies, there has been a great revolution in development of net gadgets and communication technologies like 4G, 5G etc., In parallel, there has also been a widespread increase in ways to illegally hack ...
ver más
|
|
|
|
|
|
|
Ruifang Zhao, Xiaolan Xie, Xun Zhang, Min Jin and Mengmeng Hao
Terrorist attacks are harmful to lives and property and seriously affect the stability of the international community and economic development. Exploring the regularity of terrorist attacks and building a model for assessing the risk of terrorist attacks...
ver más
|
|
|
|
|
|
|
Yixin Cao, Lei Zhang, Xiaosong Zhao, Kai Jin and Ziyi Chen
The integration of communication networks and the internet of industrial control in Industrial Control System (ICS) increases their vulnerability to cyber attacks, causing devastating outcomes. Traditional Intrusion Detection Systems (IDS) largely rely o...
ver más
|
|
|
|
|
|
|
Hosam El-Sofany,Samir Abou El-Seoud
Pág. pp. 85 - 98
the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mob...
ver más
|
|
|
|
|
|
|
Ali A. Yassin, Jian Yao and Shiyao Han
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu?Zhu?Feng scheme and indicate many shortcomi...
ver más
|
|
|
|
|
|
|
Qiong Chen, Hongyu Zhang, Yui-yip Lau, Kaiyuan Liu, Adolf K. Y. Ng, Weijie Chen, Qingmei Liao and Maxim A. Dulebenets
Maritime transportation is vital for the movement of cargo between different continents and distant locations but can be disrupted by the frequent occurrence of pirate attacks. Based on the pirate attacks from July 1994 to December 2019, a spatial analys...
ver más
|
|
|
|
|
|
|
Mohammed A. Mohammed, Manel Boujelben and Mohamed Abid
Recently, the advent of blockchain (BC) has sparked a digital revolution in different fields, such as finance, healthcare, and supply chain. It is used by smart healthcare systems to provide transparency and control for personal medical records. However,...
ver más
|
|
|
|
|
|
|
Rokia Lamrani Alaoui and El Habib Nfaoui
Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Applicat...
ver más
|
|
|
|
|
|
|
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n...
ver más
|
|
|
|
|
|
|
Petr Dzurenda,Zdenek Martinasek,Lukas Malina
Pág. 8 - 14
The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS). The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and d...
ver más
|
|
|
|
|
|
|
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are dep...
ver más
|
|
|
|
|
|
|
Li Yu, Liuquan Xu and Xuefeng Jiang
The increasing prevalence of unknown-type attacks on the Internet highlights the importance of developing efficient intrusion detection systems. While machine learning-based techniques can detect unknown types of attacks, the need for innovative approach...
ver más
|
|
|
|
|
|
|
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu...
ver más
|
|
|
|