45   Artículos

 
en línea
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo    
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jeremy Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite and Siraj Ahmed Shaikh    
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS) are becoming increasingly complex, but demonstrating the security of CPS is hard and security is frequently compromised. These compromises can lead to safety failure... ver más
Revista: Information    Formato: Electrónico

 
en línea
Sibel Kapan and Efnan Sora Gunal    
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro    
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ahmad Reda Alzighaibi    
Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal acc... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Junkai Yi and Xiaoyan Liu    
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losse... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Imran, Megat Farez Azril Zuhairi, Syed Mubashir Ali, Zeeshan Shahid, Muhammad Mansoor Alam and Mazliham Mohd Su?ud    
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent years, with the rise of the Internet of Things (IoT) application. Anomalies, often known as outliers, are defined as the discovery of anomalous occurrence... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong    
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule and Cosmas Ifeanyi Nwakanma    
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam    
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »