Results 1 to 10 of about 53,372 (247)

Surfing the Internet-of-Things: lightweight access and control of wireless sensor networks using industrial low power protocols [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2014
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Leung, Victor C M   +2 more
core   +3 more sources

An IPv6 target generation approach based on address space forest. [PDF]

open access: yesSci Rep
IPv6 target generation techniques are crucial for Internet-wide rapid scanning of IPv6 network assets. Current algorithms are mostly limited to low-dimensional patterns (pattern dimensions $$\le$$  4) within the IPv6 address space tree (6ASTree).
Hao S   +9 more
europepmc   +2 more sources

An IPv6 address fast scanning method based on local domain name association. [PDF]

open access: yesSci Rep
With the increase of security issues in IPv6 networks, conducting address scanning in IPv6 networks proves beneficial for identifying potential security risks and vulnerabilities.
Fang Y   +8 more
europepmc   +2 more sources

Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]

open access: yesPeerJ Computer Science, 2021
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi   +3 more
doaj   +2 more sources

Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates

open access: yesApplied Sciences, 2022
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of controller resources.
Mohammad Adnan Aladaileh   +5 more
doaj   +1 more source

Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN

open access: yesApplied Sciences, 2023
Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for ...
Tariq Emad Ali   +2 more
doaj   +1 more source

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

open access: yesIEEE Access, 2023
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li   +3 more
doaj   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum

open access: yesIEEE Access, 2022
Recently, the rapid flourish of blockchain technology in the financial field has attracted many cybercriminals’ attention to launching blockchain-based attacks such as ponzi schemes, scam wallets, and phishing scams.
Arkan Hammoodi Hasan Kabla   +3 more
doaj   +1 more source

Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

open access: yesApplied Sciences, 2023
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security ...
Tariq Emad Ali   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy