Results 41 to 50 of about 462,961 (193)
PROVIDE: hiding from automated network scans with proofs of identity [PDF]
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core +3 more sources
Graph neural networks and cross-protocol analysis for detecting malicious IP addresses
An internet protocol (IP) address is the foundation of the Internet, allowing connectivity between people, servers, Internet of Things, and services across the globe.
Yonghong Huang +6 more
doaj +1 more source
State of the art of interpersonal physiology in psychotherapy: A systematic review [PDF]
Introduction: The fast expanding field of Interpersonal Physiology (IP) focuses on the study of co-ordination or synchronization dynamics between the physiological activities of two, or more, individuals.
Kleinbub, Johann R.
core +2 more sources
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S +1 more
core +1 more source
Decentralized trust in the inter-domain routing infrastructure [PDF]
Inter-domain routing security is of critical importance to the Internet since it prevents unwanted traffic redirections. The current system is based on a Public Key Infrastructure (PKI), a centralized repository of digital certificates.
Bonet, Guillem +5 more
core +2 more sources
Robust Logic locking for Securing Reusable DSP Cores
A System on Chip (SoC) used in Consumer Electronics (CE) systems integrates a number of reusable Intellectual Property (IP) cores from digital signal processing (DSP), multimedia etc.
Mahendra Rathor, Anirban Sengupta
doaj +1 more source
Development of security in wireless sensor network using IPv6 [PDF]
The Wireless Sensor Networks (WSNs) is one of core technologies expected to become a potential basis of future ever-present networks. WSN consists of multiple low cost sensor nodes, which could either, have a fixed location or randomly deployed that ...
Jayapal, Vikneswary
core
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking
Information-Centric Networking (ICN) is an internetworking paradigm that offers an alternative to the current IP\nobreakdash-based Internet architecture.
Compagno, Alberto +3 more
core +1 more source
This study aims to design a Cloud Server Security System on the Linux Almalinux Operating System with DNS Management Using a Proxy Server Based on IP Masking Cloudflare using the Traffic Patterns and Packet Internet Gopher (PING) methods.
Muhamad Reza Chaedar Fatach +2 more
doaj +1 more source
Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm
In the context of growing the adoption of advanced sensors and systems for active vehicle safety and driver assistance, an increasingly important issue is the security of the information exchanged between the different sub-systems of the vehicle.
Luca Baldanzi +6 more
doaj +1 more source

