Fine-Grained Support of Security Services for Resource Constrained Internet of Things
Internet of Things (IoT) technologies allow everyday objects to be capable of connecting to the Internet, thereby making smart and convenient daily life.
Hyo Jin Ban, Jaeduck Choi, Namhi Kang
doaj +1 more source
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a ...
Zakwan AlArnaout +4 more
doaj +1 more source
Co-Creating Knowledge Online: Approaches for Community Artists
Forming peer alliances to share and build knowledge is an important aspect of community arts practice, and these co-creation processes are increasingly being mediated by the Internet.
Shea Pip
doaj +1 more source
Internet security for mobile computing [PDF]
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core +1 more source
Path Aware Transport Layer Solution for Mobile Networks
The revolutionary Fifth Generation (5G) network technology has already been deployed in many countries to provide end-to-end quality-of-service for a wide variety of services, applications, and users with extremely diverse requirements. To accomplish the
Shiva Souhith Gantha +3 more
doaj +1 more source
De-ossifying the Internet Transport Layer : A Survey and Future Perspectives [PDF]
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their useful suggestions and comments.Peer reviewedPublisher ...
Brunstrom, Anna +10 more
core +1 more source
CoAP conformance testing based on TTCN-3
Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic ...
Hong-qing DU +2 more
doaj +2 more sources
Post-COVID condition or “long COVID”, return-to work, and occupational health research
Since the beginning of the COVID-19 pandemic, there has been a growing literature on COVID and work (1). Major editorials (2–4) and reports from international associations and agencies (5–8) have highlighted the importance of ...
Alexis Descatha +2 more
doaj +1 more source
Ontology generation for flight safety messages in air traffic management
The analysis of various data is a challenging issue in the field of air traffic flow management (ATFM). Managing a large volume of data and their correct interpretation plays a key role in the prevention of air accidents, human errors, and flight ...
Mahdi Yousefzadeh Aghdam +3 more
doaj +1 more source
Surfing the Internet-of-Things: lightweight access and control of wireless sensor networks using industrial low power protocols [PDF]
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Leung, Victor C M +2 more
core +1 more source

