Results 11 to 20 of about 43,044 (189)

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking

open access: yesSensors, 2023
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability.
Abdullah Ahmed Bahashwan   +5 more
doaj   +1 more source

ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK [PDF]

open access: yesActa Electrotechnica et Informatica, 2021
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end
Cyril Filip KOVACIK, Gabriel BUGAR
doaj   +1 more source

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

open access: yesSensors, 2022
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks.
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network

open access: yesIEEE Access, 2020
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other ...
Ahmed K. Al-Ani   +3 more
doaj   +1 more source

Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel

open access: yesInformática y Sistemas, 2023
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor   +1 more
doaj   +1 more source

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms

open access: yesIEEE Access, 2021
The distributed denial of service (DDoS) attack is one of the most destructive organized cyber-attacks against online services or computers on the network.
Ayman Ghaben   +3 more
doaj   +1 more source

A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art

open access: yesIEEE Access, 2021
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous growth, with more operators connecting to these IXPs even though these IXPs faced ...
Abdijalil Abdullahi   +2 more
doaj   +1 more source

Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks

open access: yesIEEE Access, 2020
The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various domains including civilian environments, emergency operations, and military affairs.
Baidaa Hamza Khudayer   +3 more
doaj   +1 more source

Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks

open access: yesApplied Sciences, 2022
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy