Results 31 to 40 of about 104,367 (277)

Fine-Grained Support of Security Services for Resource Constrained Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Internet of Things (IoT) technologies allow everyday objects to be capable of connecting to the Internet, thereby making smart and convenient daily life.
Hyo Jin Ban, Jaeduck Choi, Namhi Kang
doaj   +1 more source

RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks

open access: yesSensors, 2022
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a ...
Zakwan AlArnaout   +4 more
doaj   +1 more source

Co-Creating Knowledge Online: Approaches for Community Artists

open access: yesCultural Science, 2013
Forming peer alliances to share and build knowledge is an important aspect of community arts practice, and these co-creation processes are increasingly being mediated by the Internet.
Shea Pip
doaj   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Path Aware Transport Layer Solution for Mobile Networks

open access: yesIEEE Access, 2020
The revolutionary Fifth Generation (5G) network technology has already been deployed in many countries to provide end-to-end quality-of-service for a wide variety of services, applications, and users with extremely diverse requirements. To accomplish the
Shiva Souhith Gantha   +3 more
doaj   +1 more source

De-ossifying the Internet Transport Layer : A Survey and Future Perspectives [PDF]

open access: yes, 2016
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their useful suggestions and comments.Peer reviewedPublisher ...
Brunstrom, Anna   +10 more
core   +1 more source

CoAP conformance testing based on TTCN-3

open access: yesTongxin xuebao, 2013
Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic ...
Hong-qing DU   +2 more
doaj   +2 more sources

Post-COVID condition or “long COVID”, return-to work, and occupational health research

open access: yesScandinavian Journal of Work, Environment & Health, 2023
Since the beginning of the COVID-19 pandemic, there has been a growing literature on COVID and work (1). Major editorials (2–4) and reports from international associations and agencies (5–8) have highlighted the importance of ...
Alexis Descatha   +2 more
doaj   +1 more source

Ontology generation for flight safety messages in air traffic management

open access: yesJournal of Big Data, 2021
The analysis of various data is a challenging issue in the field of air traffic flow management (ATFM). Managing a large volume of data and their correct interpretation plays a key role in the prevention of air accidents, human errors, and flight ...
Mahdi Yousefzadeh Aghdam   +3 more
doaj   +1 more source

Surfing the Internet-of-Things: lightweight access and control of wireless sensor networks using industrial low power protocols [PDF]

open access: yes, 2014
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Leung, Victor C M   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy