Results 41 to 50 of about 462,961 (193)

PROVIDE: hiding from automated network scans with proofs of identity [PDF]

open access: yes, 2016
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core   +3 more sources

Graph neural networks and cross-protocol analysis for detecting malicious IP addresses

open access: yesComplex & Intelligent Systems, 2022
An internet protocol (IP) address is the foundation of the Internet, allowing connectivity between people, servers, Internet of Things, and services across the globe.
Yonghong Huang   +6 more
doaj   +1 more source

State of the art of interpersonal physiology in psychotherapy: A systematic review [PDF]

open access: yes, 2017
Introduction: The fast expanding field of Interpersonal Physiology (IP) focuses on the study of co-ordination or synchronization dynamics between the physiological activities of two, or more, individuals.
Kleinbub, Johann R.
core   +2 more sources

Securing Internet Protocol (IP) Storage: A Case Study

open access: yes, 2010
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S   +1 more
core   +1 more source

Decentralized trust in the inter-domain routing infrastructure [PDF]

open access: yes, 2019
Inter-domain routing security is of critical importance to the Internet since it prevents unwanted traffic redirections. The current system is based on a Public Key Infrastructure (PKI), a centralized repository of digital certificates.
Bonet, Guillem   +5 more
core   +2 more sources

Robust Logic locking for Securing Reusable DSP Cores

open access: yesIEEE Access, 2019
A System on Chip (SoC) used in Consumer Electronics (CE) systems integrates a number of reusable Intellectual Property (IP) cores from digital signal processing (DSP), multimedia etc.
Mahendra Rathor, Anirban Sengupta
doaj   +1 more source

Development of security in wireless sensor network using IPv6 [PDF]

open access: yes, 2009
The Wireless Sensor Networks (WSNs) is one of core technologies expected to become a potential basis of future ever-present networks. WSN consists of multiple low cost sensor nodes, which could either, have a fixed location or randomly deployed that ...
Jayapal, Vikneswary
core  

To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking

open access: yes, 2015
Information-Centric Networking (ICN) is an internetworking paradigm that offers an alternative to the current IP\nobreakdash-based Internet architecture.
Compagno, Alberto   +3 more
core   +1 more source

Cloud Server Security System Design on Linux Almalinux 8.6 Operating System Based on WHM with DNS Management Using IP Masking Cloudflare

open access: yesJournal of Electrical Engineering and Computer
This study aims to design a Cloud Server Security System on the Linux Almalinux Operating System with DNS Management Using a Proxy Server Based on IP Masking Cloudflare using the Traffic Patterns and Packet Internet Gopher (PING) methods.
Muhamad Reza Chaedar Fatach   +2 more
doaj   +1 more source

Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm

open access: yesSensors, 2020
In the context of growing the adoption of advanced sensors and systems for active vehicle safety and driver assistance, an increasingly important issue is the security of the information exchanged between the different sub-systems of the vehicle.
Luca Baldanzi   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy