Results 311 to 320 of about 5,465,959 (370)
Some of the next articles are maybe not open access.
An Antibody Layer for Internet security
Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137), 2002With the rising innovative antigens (such as intruders and viruses) through the Internet, reliable security mechanisms are required to perceptively detect and put them down. However, defense techniques of the current host system over the Internet may not properly analyze Internet antigens, because trends of attacks are unexpectedly shifted.
null Jabeom Gu +3 more
openaire +1 more source
Radio Frequency Fingerprint Identification for Device Authentication in the Internet of Things
IEEE Communications Magazine, 2023Device authentication of wireless devices at the physical layer could augment security enforcement before fully decoding packets. At the upper layers of the stack, this is conventionally handled by cryptographic schemes. However, the associated computing
Junqing Zhang +3 more
semanticscholar +1 more source
Deep Learning-Based Network Intrusion Detection System for Internet of Medical Things
IEEE Internet of Things Magazine, 2023This article presents a deep learning-based approach for network-based intrusion detection in the Internet of medical things (IoMT) systems using features of network flows and patient biometrics.
Vinayakumar Ravi, T. Pham, M. Alazab
semanticscholar +1 more source
IEEE Internet of Things Journal, 2019
Internet of Things (IoT) security becomes of great importance, as IoT is the foundation for many emerging services. To safeguard IoT security, cryptosystems at upper layer relying on sophisticated key management alone can face many challenges due to the ...
Ning Zhang +4 more
semanticscholar +1 more source
Internet of Things (IoT) security becomes of great importance, as IoT is the foundation for many emerging services. To safeguard IoT security, cryptosystems at upper layer relying on sophisticated key management alone can face many challenges due to the ...
Ning Zhang +4 more
semanticscholar +1 more source
Internet Application-Layer Protocols
2007In the previous chapter, we saw how IP packets carry TCP segments or UDP datagrams across networks. Now it is time to look at what happens in the top layer of a TCP/IP-based network, the application layer. This chapter starts with an explanation of client–server technology, which underlies most Internet activities. We examine the following applications
openaire +1 more source
Application Layer and Internet Applications
2013We have so far seen how data is transported from one computer to another over the global Internet, yet an interface is still missing where this basic technology can be used for special services and applications. Tasks that have now become an integral part of life, such as sending electronic mail or using interactive information resources on the World ...
Christoph Meinel, Harald Sack
openaire +1 more source
The Internet as a complex layered system
2016Mainstream discussions of Internet economics often rely on assumptions that were already seriously in doubt by the middle of the twentieth century. As it turns out, the rise of new economic thinking, along with new technology platforms culminating in the Internet, directly challenge many of those chief assumptions.
Stephen J. Schultze, Richard S. Whitt
openaire +1 more source
The Internet, IP, and the optical layer
Fifth Asia-Pacific Conference on ... and Fourth Optoelectronics and Communications Conference on Communications,, 1999IP-based services differ fundamentally in many dimensions from traditional voice-bases services. Since today's transport networks were optimized for these traditional services it should be expected that far-reaching changes will be needed if IP becomes dominant.
openaire +1 more source
Wireless Physical-Layer Authentication for the Internet of Things
2017Authentication of messages in an Internet of Things (IoT) is a key security feature that may involve heavy signaling and protocol procedures, not suitable for small devices with very limited computational capabilities and energy availability. In this chapter we address the problem of message authentication in an IoT context, by using physical-layer ...
CAPARRA, GIANLUCA +4 more
openaire +3 more sources
Internet Thinking for Layered Energy Infrastructure
2020Huge shifts in the structure and functionality are brewing in the sector of power and energy with the wide deployment of renewable energy and rapid development of electricity market. Growing demand for intelligent appliances and autonomous devices poses a great challenge to the existing power-energy systems. With inspirations from the Internet, in this
Haochen Hua, Chuantong Hao, Yuchao Qin
openaire +1 more source

