41   Artículos

 
en línea
Fahad M. Alotaibi and Vassilios G. Vassilakis    
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jamal Khudair Madhloom, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen and Saad M. Darwish    
Due to the Internet?s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secur... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Sachin Sharma and Avishek Nag    
The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data pl... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Chun-Liang Lee, Guan-Yu Lin and Yaw-Chung Chen    
To support advanced network services, Internet routers must perform packet classification based on a set of rules called packet filters. If two or more filters overlap, a filter conflict will occur and lead to ambiguity in packet classification. Further,... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Gengxian Li, Chundong Wang and Huaibin Wang    
Decentralized networks bring us many benefits, but as networks evolve, many nodes either actively or passively become unreachable behind an NAT or a firewall. This has become a hindrance to the development of decentralized networks, where peer-to-peer co... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Claudio Marques, Silvestre Malta and João Magalhães    
Nowadays there are many DNS firewall solutions to prevent users accessing malicious domains. These can provide real-time protection and block illegitimate communications, contributing to the cybersecurity posture of the organizations. Most of these solut... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Michael Alicea and Izzat Alsmadi    
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Konstantina Fotiadou, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou and Theodore Zahariadis    
Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems. In this work, we propose novel Deep Learni... ver más
Revista: Information    Formato: Electrónico

 
en línea
Keyong Wang, Mengyao Tong, Dequan Yang and Yuhang Liu    
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the pu... ver más
Revista: Information    Formato: Electrónico

 
en línea
Calum C. Hall, Lynsay A. Shepherd and Natalie Coull    
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »