Results 1 to 10 of about 462,961 (193)

IP Security [PDF]

open access: yesInternational Research Journal of Management, IT & Social Sciences, 2016
IP is stands for Internet Protocol. IP security is a set service which secures the documents by the unauthorized entity. IP Sec covers the three areas of functionality that is authentication, confidentiality, and key management.
Singh, S. (Saroj)
core   +3 more sources

Security Risks in IP Telephony

open access: yesAdvances in Electrical and Electronic Engineering, 2010
This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system.
Filip Rezac, Miroslav Voznak
doaj   +2 more sources

Efficiently Secure Architecture for Future Network [PDF]

open access: yesJisuanji kexue, 2023
Traditional IP-based Internet offers an end-to-end data transport service and has developed rapidly in the past half-century.However,serious security incidents emerged from attacks based on traditional networks.Traditional security mechanisms(e.g ...
YANG Xin, LI Hui, QUE Jianming, MA Zhentai, LI Gengxin, YAO Yao, WANG Bin, JIANG Fuli
doaj   +1 more source

A Novel Moving Target Defense Scheme With Physical Unclonable Functions-Based Authentication

open access: yesIEEE Access, 2022
Recent studies have discovered possible security issues on Supervisory Control and Data Acquisition systems (SCADA) in the critical architecture and focus on developing protection mechanisms on this system.
Chuan-Gang Liu
doaj   +1 more source

A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks

open access: yesSensors, 2021
Mobile ad-hoc networks (MANETs) have great potential applications in military missions or emergency rescue due to their no-infrastructure, self-organizing and multi hop capability characteristics.
Pengkun Wang, Momiao Zhou, Zhizhong Ding
doaj   +1 more source

Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression

open access: yesIEEE Access, 2022
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj   +1 more source

Security in transnational interoperable PPDR communications: threats and requirements [PDF]

open access: yes, 2015
The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework ...
Duits, Michel   +9 more
core   +6 more sources

Multidomain Network Based on Programmable Networks: Security Architecture [PDF]

open access: yes, 2005
This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes ...
Alarcos, Bernardo   +2 more
core   +2 more sources

Finding and Analyzing Evil Cities on the Internet [PDF]

open access: yes, 2011
IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocation analysis is performed at country level.
Moura, Giovane C.M.   +2 more
core   +5 more sources

Intellectual Property and Opportunities for Food Security in the Philippines [PDF]

open access: yes, 2013
By 2050, the Philippine population is projected to increase by as much as 41 percent, from 99.9 million to nearly 153 million people. Producing enough food for such an expanding population and achieving food security remain a challenge for the Philippine
Alfonso, Antonio   +6 more
core   +3 more sources

Home - About - Disclaimer - Privacy