10   Artículos

 
en línea
Fahad M. Alotaibi and Vassilios G. Vassilakis    
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Jesús Díaz-Verdejo, Javier Muñoz-Calle, Antonio Estepa Alonso, Rafael Estepa Alonso and Germán Madinabeitia    
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton and Samuel Russ    
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a da... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Mike Nkongolo, Jacobus Philippus van Deventer and Sydney Mambwe Kasongo    
This research attempts to introduce the production methodology of an anomaly detection dataset using ten desirable requirements. Subsequently, the article presents the produced dataset named UGRansome, created with up-to-date and modern network traffic (... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »