Results 31 to 40 of about 3,560 (200)
Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation
Owing to a growing number of attacks, the assessment of Industrial Control Systems (ICSs) has gained in importance. An integral part of an assessment is the creation of a detailed inventory of all connected devices, enabling vulnerability evaluations ...
Auffret P +18 more
core +1 more source
Ontology-based Approach for Malicious Behaviour Detection in Synchrophasor Networks [PDF]
Synchrophasor systems are becoming a vital requirement for real-time monitoring, control and protection of emerging Smart Grids that need cyber security issues be carefully analysed and mitigated.
Albalushi, Abdullah +3 more
core +1 more source
Address Resolution Protocol (ARP) spoofing has been a long-standing problem with no clear remedy until now. The attacks can be launched easily utilizing an enormous number of publicly available tools on the web; however, they are extremely tough to ...
Laurent Patrice +2 more
doaj +1 more source
Multifaceted Faculty Network Design and Management: Practice and Experience Report [PDF]
We report on our experience on multidimensional aspects of our faculty's network design and management, including some unique aspects such as campus-wide VLANs and ghosting, security and monitoring, switching and routing, and others.
Assels, Michael J. +5 more
core +2 more sources
SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong +3 more
core +1 more source
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
Membangun Sistem Keamanan Arp Spoofing Memanfaatkan Arpwatch dan Addons Firefox [PDF]
The Development of information Technology, especially computer networks and the service in a rejuvenate the human side. The development of the internet is very widespread. The security level digital data becomes vulnerable to attack by the attacker.
Sajati, H. (Haruno) +1 more
core
Studying Malicious Websites and the Underground Economy on the Chinese Web [PDF]
The World Wide Web gains more and more popularity within China with more than 1.31 million websites on the Chinese Web in June 2007. Driven by the economic profits, cyber criminals are on the rise and use the Web to exploit innocent users.
Guo, Jinpeng +5 more
core +4 more sources
Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley +1 more source
A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks
Nowadays, most public facilities provide free internet access to support daily activities. These public internet facilities are open to anyone, making them prone to attacks.
Standy Oei +2 more
doaj +1 more source

