Results 11 to 20 of about 14,435 (215)

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Caracterización de IPv6 [PDF]

open access: yesRevista Tecnura, 2013
El presente artículo tiene como finalidad hacer un recuento de lo que es el protocolo IPv6; des­de la evolución de IPv4, que motivó el diseño de nuevas características, hasta los detalles que componen la nueva versión del protocolo de In­ternet. En las secciones principales del artículo se explican los inconvenientes de IPv4 que se resuelven al ...
Castillo Medina, Carlos A   +1 more
openaire   +4 more sources

An evaluation of IPv6 multicast router in JGN IPv6 networks [PDF]

open access: green2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops., 2004
This paper describes an evaluation of IPv6 multicast routers. The JGN IPv6 project has performed various evaluations and verifications of IPv6 routers. Seven (7) types of routers from six vendors were tested, for which PIM-SM was employed as an IPv6 multicast protocol for the evaluation.
Yukiji Mikamo   +5 more
openalex   +2 more sources

Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2014
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Zhengguo Sheng   +2 more
doaj   +1 more source

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking

open access: yesSensors, 2023
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability.
Abdullah Ahmed Bahashwan   +5 more
doaj   +1 more source

Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review

open access: yesIEEE Access, 2022
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network.
Arkan Hammoodi Hasan Kabla   +6 more
doaj   +1 more source

Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks

open access: yesIEEE Access, 2020
The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various domains including civilian environments, emergency operations, and military affairs.
Baidaa Hamza Khudayer   +3 more
doaj   +1 more source

Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

open access: yesApplied Sciences, 2023
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security ...
Tariq Emad Ali   +2 more
doaj   +1 more source

ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK [PDF]

open access: yesActa Electrotechnica et Informatica, 2021
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end
Cyril Filip KOVACIK, Gabriel BUGAR
doaj   +1 more source

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

open access: yesSensors, 2022
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks.
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy