Results 41 to 50 of about 41,910 (290)

SecSip: A Stateful Firewall for SIP-based Networks [PDF]

open access: yes, 2009
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core   +5 more sources

Joint Security and QoS Provisioning in Train-Centric CBTC Systems Under Sybil Attacks

open access: yesIEEE Access, 2019
The security and Quality-of-Service (QoS) provisioning are two critical themes in urban rail communication-based train control (CBTC) data communication systems, which can directly affect the train's safe operation.
Xiaoxuan Wang   +3 more
doaj   +1 more source

EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS

open access: yesJurnal Ilmu Komputer dan Informasi, 2013
Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the ...
Khalil I Ghathwan   +2 more
doaj   +1 more source

IDLP: An Efficient Intrusion Detection and Location-Aware Prevention Mechanism for Network Coding-Enabled Mobile Small Cells

open access: yesIEEE Access, 2020
Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner.
Reza Parsamehr   +3 more
doaj   +1 more source

Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]

open access: yes, 2003
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J.   +1 more
core   +3 more sources

Secure Estimation in V2X Networks with Injection and Packet Drop Attacks [PDF]

open access: yes2018 15th International Symposium on Wireless Communication Systems (ISWCS), 2018
Vehicle-to-anything (V2X) communications are essential for facilitating cooperative intelligent transport system (C- ITS) components such as traffic safety and traffic efficiency applications. Integral to proper functioning of C- ITS systems is sensing and telemetery.
Arpan Chattopadhyay   +2 more
openaire   +1 more source

PROVIDE: hiding from automated network scans with proofs of identity [PDF]

open access: yes, 2016
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core   +3 more sources

FAIR: Forwarding Accountability for Internet Reputability

open access: yes, 2016
This paper presents FAIR, a forwarding accountability mechanism that incentivizes ISPs to apply stricter security policies to their customers. The Autonomous System (AS) of the receiver specifies a traffic profile that the sender AS must adhere to ...
Pappas, Christos   +2 more
core   +1 more source

Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

open access: yes, 2018
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments.
Calyam, Prasad   +7 more
core   +1 more source

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

Home - About - Disclaimer - Privacy