Results 81 to 90 of about 3,560 (200)

Analisa Keamanan Wireless Network Di Warnet Javatechno [PDF]

open access: yes, 2012
Jaringan nirkabel merupakan teknologi jaringan yang menggunakan udara sebagai medium transmisi data. Warnet Javatechno merupakan salah satu warnet yang mempunyai fasilitas jaringan nirkabel (wireless).
MAYANGSARI ADANINGGAR, CITRA
core  

SLT-driven deep networks for robust and generalizable cyber threat detection

open access: yesDiscover Computing
The exponential increase in cyber-physical devices has shrunk the timeline of network threat detection to real-time, with particular urgency for covert attacks like Man-in-the-Middle (MITM) and ARP spoofing.
Suneeta Satpathy   +2 more
doaj   +1 more source

Arp Spoofing Detection via Wireshark and Veracode [PDF]

open access: yes, 2018
In current scenario, static and DHCP both has addressing schemes which also protect large number of end users without any burden on administrator. Also performance study need real network[1] and the final result shows that end user take not more than one
Abid, M. K. (Ms), Singh, A. K. (Ajay)
core  

SM ARP Stochastic Markovian Game Model for Packet Forwarding Based ARP Spoofing Attacks Detection

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
Address Resolution Protocol (ARP) spoofing attacks have become the most pivotal attacks in deteriorating the performance of computer networks. The objective of this paper is to develop SM-ARP, Stochastic Markovian game model based ARP spoofing attack detection scheme.Although many recent techniques have been developed to detect and protect against ARP ...
C. Divya, D Francis Xavier Christopher
openaire   +1 more source

Application of the Keyword Recognition in the Network Monitoring

open access: yesJournal of Measurement Science and Instrumentation, 2011
In this paper,the specific application of key words spotting used in the network monitoring is studied,and the keywords spotting is emphasized.The whole monitoring system is divided into two modules:network monitoring and keywords spotting.In the part of
Hai-yan YANG, Xin-xing JING
doaj  

PENTESTING VOIP PARA DETERMINAR LAS VULNERABILIDADES DEL SERVIDOR DE COMUNICACION DEL AREA DE SOPORTE DE LA EMPRESA CHAPACUETE DE LA CIUDAD DE HUÁNUCO PERIODO 2019 [PDF]

open access: yes, 2019
La investigación se enfocó que en análisis de las vulnerabilidades del servidor VOIP de la empresa Chapacuete de la ciudad de Huánuco. El proceso de pentesting consistió en la aplicación de una serie de herramientas bajo software libre para la ...
Martel Ramos, Ivan Cruz
core  

Deep learning approaches for protecting IoT devices in smart homes from MitM attacks

open access: yesFrontiers in Computer Science
The primary objective of this paper is to enhance the security of IoT devices in Software-Defined Networking (SDN) environments against Man-in-the-Middle (MitM) attacks in smart homes using Artificial Intelligence (AI) methods as part of an Intrusion ...
Nader Karmous   +6 more
doaj   +1 more source

Scenario based security evaluation: Generic OpenFlow network [PDF]

open access: yes, 2014
Demand for network programmability was recognized when development of protocolsslowed down due to network inflexibilities in 1980s. Research speeded up andmany proposals were made to solve architectural issues during 2000s.
Lähteenmäki, Jarno
core  

Perancangan dan Implementasi Perangkat Lunak Proxy Tunnel dengan Enkripsi Kunci Simetrisasimetris untuk Manipulasi Paket Data [PDF]

open access: yes, 2011
S: The authors conducted a study on wiretapping in computer networks because of it is very disturbing security and comfort in the surf. Therefore the writer create a proxy tunnel software with symmetric and asymmetric encryption as a security agent that ...
Gat, G. (Gat)
core  

Artificial intelligence approach to intrusion detection in industrial control systems with real world dataset generation and model evaluation

open access: yesDiscover Artificial Intelligence
This study addresses escalating cybersecurity challenges within Industrial Control Systems (ICS), focusing on Programmable Logic Controllers (PLCs), through the application of artificial intelligence for intrusion detection.
Ahmad Houkan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy