818   Artículos

« Anterior     Página: 1 de 41     Siguiente »

 
en línea
Fazar Dawamsyach,Ikhwan Ruslianto,Uray Ristian     Pág. 149 - 161
Server security is an important thing that must be considered so that the server can work well and serve users. Attacks on servers can threaten server performance and data security in it. According to the National Cyber and Crypto Agency 2020 report, por... ver más

 
en línea
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule and Cosmas Ifeanyi Nwakanma    
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh    
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Firas Najjar, Qusay Bsoul and Hasan Al-Refai    
Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on t... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang and Zhuming Bi    
Speaker verification systems use human voices as an important biometric to identify legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart homes against illegal access. Recent studies have demonstrated that speaker ve... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Shaked Delarea and Yossi Oren    
Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a maliciou... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zhirui Luo, Qingqing Li and Jun Zheng    
Transfer learning using pre-trained deep neural networks (DNNs) has been widely used for plant disease identification recently. However, pre-trained DNNs are susceptible to adversarial attacks which generate adversarial samples causing DNN models to make... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuvaraj D,Sivaram M,A. Mohamed Uvaze Ahamed,Nageswari S     Pág. pp. 71 - 88
With advancements in device and communication technologies, there has been a great revolution in development of net gadgets and communication technologies like 4G, 5G etc., In parallel, there has also been a widespread increase in ways to illegally hack ... ver más

 
en línea
Ruifang Zhao, Xiaolan Xie, Xun Zhang, Min Jin and Mengmeng Hao    
Terrorist attacks are harmful to lives and property and seriously affect the stability of the international community and economic development. Exploring the regularity of terrorist attacks and building a model for assessing the risk of terrorist attacks... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Yixin Cao, Lei Zhang, Xiaosong Zhao, Kai Jin and Ziyi Chen    
The integration of communication networks and the internet of industrial control in Industrial Control System (ICS) increases their vulnerability to cyber attacks, causing devastating outcomes. Traditional Intrusion Detection Systems (IDS) largely rely o... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hosam El-Sofany,Samir Abou El-Seoud     Pág. pp. 85 - 98
the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mob... ver más

 
en línea
Ali A. Yassin, Jian Yao and Shiyao Han    
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu?Zhu?Feng scheme and indicate many shortcomi... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Qiong Chen, Hongyu Zhang, Yui-yip Lau, Kaiyuan Liu, Adolf K. Y. Ng, Weijie Chen, Qingmei Liao and Maxim A. Dulebenets    
Maritime transportation is vital for the movement of cargo between different continents and distant locations but can be disrupted by the frequent occurrence of pirate attacks. Based on the pirate attacks from July 1994 to December 2019, a spatial analys... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Mohammed A. Mohammed, Manel Boujelben and Mohamed Abid    
Recently, the advent of blockchain (BC) has sparked a digital revolution in different fields, such as finance, healthcare, and supply chain. It is used by smart healthcare systems to provide transparency and control for personal medical records. However,... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rokia Lamrani Alaoui and El Habib Nfaoui    
Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Applicat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim    
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Petr Dzurenda,Zdenek Martinasek,Lukas Malina     Pág. 8 - 14
The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS). The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and d... ver más

 
en línea
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch    
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are dep... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Li Yu, Liuquan Xu and Xuefeng Jiang    
The increasing prevalence of unknown-type attacks on the Internet highlights the importance of developing efficient intrusion detection systems. While machine learning-based techniques can detect unknown types of attacks, the need for innovative approach... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar    
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 41     Siguiente »