Results 21 to 30 of about 944,819 (280)

One leak will sink a ship:WebRTC IP address leaks [PDF]

open access: yes, 2017
The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. This API causes a range of client IP addresses to become available to a visited website via JavaScript even if a VPN is in use.
Al-Fannah, Nasser Mohammed
core   +2 more sources

Implementasi Trunk Interkoneksi Multi Server menggunakan Singleboard Komputer

open access: yesJurnal Jaringan Telekomunikasi, 2021
Voice over Internet Protocol (juga disebut VoIP, IP Telephony, Internet telephony atau Digital Phone) adalah teknologi yang memungkinkan percakapan suara jarak jauh melalui media internet.
Alwalid Nouvatie   +2 more
doaj   +1 more source

Internet source address verification method based on synchronization and dynamic filtering in address domain

open access: yesDianxin kexue, 2020
At the beginning of the design of the Internet architecture,it assumed that all network members were trusted,and did not fully consider the security threat brought by the untrusted network members.For a long time,routers only forward packets based on the
Dan LI   +7 more
doaj   +2 more sources

PROVIDE: hiding from automated network scans with proofs of identity [PDF]

open access: yes, 2016
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core   +3 more sources

Researcb on Private IP Address Mutiplexing in Mobile PS Domain

open access: yesDianxin kexue, 2014
With the rapid development of mobile internet, a large number of IP address is consumed because most of mobile terminal is always online. Class A private IP address(10.0.0.0/8)are not adequate for large-scale operators any more. A new method was proposed
Hui Xiao   +3 more
doaj   +2 more sources

Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking [PDF]

open access: yes, 2013
Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content becomes a first-class entity.
Compagno, Alberto   +3 more
core   +3 more sources

Analisis Malware Aquvaprn.exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi)
Di era serba digital saat ini, data menjadi sebuah aset yang sangat berharga. Berbagai macam teknik digunakan untuk mencuri data pribadi yang berpotensi disalahgunakan oleh pihak yang tidak bertanggung jawab.
Hafish Naufal Aditya   +2 more
doaj   +1 more source

A Method for Cheating Indication in Unproctored On-Line Exams

open access: yesSensors, 2022
COVID-19 has disrupted every field of life and education is not immune to it. Student learning and examinations moved on-line on a few weeks notice, which has created a large workload for academics to grade the assessments and manually detect students ...
Dan Komosny, Saeed Ur Rehman
doaj   +1 more source

A DHCP-based IP address autoconfiguration for MANETs [PDF]

open access: yes, 2006
Mobile Ad hoc Networks (MANETs) are expected to become more and more important in the upcoming years, playing a significant role in 4G networks. In order to enable the deployment of IP services in such networks, IP address autoconfiguration mechanisms
Bernardos Cano, Carlos Jesús   +1 more
core   +2 more sources

Developing an application based on OpenFlow to enhance mobile IP networks [PDF]

open access: yes, 2013
Mobile Internet Protocol (IP) has been developed to maintain permanent IP addresses for mobile users while they are moving from one point to another where the Mobile Terminal (MT) device will have two IP addresses: a static home address and a care-of ...
Al Sabbagh, A   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy