Results 41 to 50 of about 3,560 (200)

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Investigation of Secure Communication of Modbus TCP/IP Protocol: Siemens S7 PLC Series Case Study

open access: yesApplied System Innovation
Industrial Control Systems (ICS) have become increasingly vulnerable to cyber threats due to the growing interconnectivity with enterprise networks and the Industrial Internet of Things (IIoT).
Quy-Thinh Dao   +4 more
doaj   +1 more source

Enhancing Security and Performance in Live VM Migration: A Machine Learning‐Driven Framework With Selective Encryption for Enhanced Security and Performance in Cloud Computing Environments

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT Live virtual machine (LVM) migration is pivotal in cloud computing for its ability to seamlessly transfer virtual machines (VMs) between physical hosts, optimise resource utilisation, and enable uninterrupted service. However, concerns persist regarding safeguarding sensitive data during migration, particularly in critical sectors like ...
Raseena M. Haris   +4 more
wiley   +1 more source

Analisis Keamanan Lalu Lintas Paket Data pada Ubuntu Menggunakan Metode Attack Centric [PDF]

open access: yes, 2017
Data traffic security in a network is very important, especially on a large scale such as companies, agencies and universities that have a lot of personal data.
Afrizal, F. (Feizil)   +2 more
core  

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Metodología de evaluación de sistema de detección de intrusos frente ataques de suplantación protocolo de resolución de direcciones y sistema de nombres de dominios [PDF]

open access: yes, 2017
Hoy en día una de las pertenencias más preciadas para las empresas, instituciones, entidades y personas es la información, ya que por medio de esta se realizan todo tipo de procedimientos en la gran mayoría de escenarios en los que se use la tecnología ...
Aguirre Utima, Diana Alejandra   +1 more
core  

A survey on security issues and solutions at different layers of Cloud computing [PDF]

open access: yes, 2012
Cloud computing offers scalable on-demand services to consumers with greater flexibility and lesser infrastructure investment. Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities ...
Borisaniya, B.   +4 more
core   +1 more source

Scalable cyber‐physical testbed for cybersecurity evaluation of synchrophasors in power systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
This paper introduces a synchrophasor‐based cyber‐physical power system testbed using the pySynphasor tool for emulating various cyber‐attacks on phasor measurement units (PMUs). The testbed combines real‐time simulation, virtual machines, network emulation, and packet manipulation for scalable cyber‐security testing, focussing on attacks like ARP ...
Shuvangkar Chandra Das   +2 more
wiley   +1 more source

Secure Trajectory Planning Against Undetectable Spoofing Attacks

open access: yes, 2019
This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker.
Bianchin, Gianluca   +2 more
core   +1 more source

Detection and Prevention of ARP spoofing using Centralized Server [PDF]

open access: yesInternational Journal of Computer Applications, 2015
Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking.
J.Deepa J.Deepa   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy