Results 91 to 100 of about 3,560 (200)

ARP Spoof Detection and Mitigation

open access: yes
Wireless Local Area Networks (WLANs) have become ubiquitous in modern connectivity landscapes, offering convenience and flexibility. However, they also introduce vulnerabilities, including Address Resolution Protocol (ARP) spoofing attacks, which exploit the inherent characteristics of WLANs to compromise network security. The proposed method begins by
Prema Arokiya Mary G   +3 more
openaire   +1 more source

CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment. [PDF]

open access: yesSensors (Basel), 2023
Neto ECP   +5 more
europepmc   +1 more source

Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. [PDF]

open access: yesSensors (Basel), 2023
Riggs H   +7 more
europepmc   +1 more source

Enhancement of cryptography algorithms for security of cloud-based IoT with machine learning models. [PDF]

open access: yesSci Rep
Qasem MA   +5 more
europepmc   +1 more source

A Systematic Review of Data-Driven Attack Detection Trends in IoT. [PDF]

open access: yesSensors (Basel), 2023
Haque S   +3 more
europepmc   +1 more source

Model based Intrusion Detection System for Synchrophasor Applications in Smart Grid [PDF]

open access: yes, 2018
Albalushi, Abdullah   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy