Results 11 to 20 of about 14,618 (242)
Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols [PDF]
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Zhengguo Sheng+2 more
doaj +1 more source
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li+3 more
doaj +1 more source
El presente artículo tiene como finalidad hacer un recuento de lo que es el protocolo IPv6; desde la evolución de IPv4, que motivó el diseño de nuevas características, hasta los detalles que componen la nueva versión del protocolo de Internet. En las secciones principales del artículo se explican los inconvenientes de IPv4 que se resuelven al ...
Castillo Medina, Carlos A+1 more
openaire +4 more sources
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability.
Abdullah Ahmed Bahashwan+5 more
doaj +1 more source
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda+4 more
doaj +1 more source
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other ...
Ahmed K. Al-Ani+3 more
doaj +1 more source
Illuminating Large-Scale IPv6 Scanning in the Internet [PDF]
While scans of the IPv4 space are ubiquitous, today little is known about scanning activity in the IPv6 Internet. In this work, we present a longitudinal and detailed empirical study on large-scale IPv6 scanning behavior in the Internet, based on firewall logs captured at some 230,000 hosts of a major Content Distribution Network (CDN).
arxiv +1 more source
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network.
Arkan Hammoodi Hasan Kabla+6 more
doaj +1 more source
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security ...
Tariq Emad Ali+2 more
doaj +1 more source
The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various domains including civilian environments, emergency operations, and military affairs.
Baidaa Hamza Khudayer+3 more
doaj +1 more source