Results 81 to 90 of about 76,542 (243)

Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

open access: yesEURASIP Journal on Information Security
The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to Internet security, and botmasters have adopted the robust concept of decentralisation to develop and ...
Arkan Hammoodi Hasan Kabla   +4 more
doaj   +1 more source

Securing Internet of Things with Lightweight IPsec [PDF]

open access: yes, 2010
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in
Chung, Tony   +5 more
core   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

BGP-like TE Capabilities for SHIM6 [PDF]

open access: yes, 2006
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing traffic engineering (TE) policies in a multiaddressed IPv6 scenario.
Azcorra, Arturo   +2 more
core   +4 more sources

Blockchain‐Enhanced Distributed Cache Management for Top‐Level Domain Resolution Optimization

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
A distributed domain master resolution architecture based on blockchain. ABSTRACT In the current Internet era, whether the domain name system (DNS) can achieve efficient resolution is of great significance for optimizing user experience and promoting global development.
Lianjie Song, Xueshan Lin
wiley   +1 more source

Demo: An Interoperability Development and Performance Diagnosis Environment [PDF]

open access: yes, 2011
Interoperability is key to widespread adoption of sensor network technology, but interoperable systems have traditionally been difficult to develop and test.
Culler, David   +8 more
core   +2 more sources

CID‐RPL: Clone ID Attack Detection Using Deep Neural Network for RPL‐Based IoT Networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper addresses the security vulnerability of Clone ID attacks in RPL‐based IoT networks, which threaten network integrity by cloning legitimate node identities. A novel two‐layer deep neural network approach is proposed to detect these attacks based on network traffic patterns, significantly improving detection accuracy, precision, and system ...
Fatima Al‐Quayed   +5 more
wiley   +1 more source

PERFORMANCE ANALYSIS BETWEEN EXPLICIT SCHEDULING AND IMPLICIT SCHEDULING OF PARALLEL ARRAY-BASED DOMAIN DECOMPOSITION USING OPENMP [PDF]

open access: yesJournal of Engineering Science and Technology, 2014
With the continuous revolution of multicore architecture, several parallel programming platforms have been introduced in order to pave the way for fast and efficient development of parallel algorithms.
MOHAMMED FAIZ ABOALMAALY   +3 more
doaj  

Overcoming obstacles to IPv6 on WLCG [PDF]

open access: yesEPJ Web of Conferences
The transition of the Worldwide Large Hadron Collider Computing Grid (WLCG) storage services to dual-stack IPv6/IPv4 is almost complete; all Tier-1 and 94% of Tier-2 storage are IPv6 enabled.
Babik Marian   +20 more
doaj   +1 more source

Towards autonomous device protection using behavioural profiling and generative artificial intelligence

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley   +1 more source

Home - About - Disclaimer - Privacy