Results 51 to 60 of about 83,142 (315)

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

open access: yes, 2018
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E.   +5 more
core   +1 more source

PROVIDE: hiding from automated network scans with proofs of identity [PDF]

open access: yes, 2016
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core   +3 more sources

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey

open access: yes, 2012
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar   +2 more
core   +2 more sources

A new method for improving security in MANETs AODV Protocol [PDF]

open access: yesManagement Science Letters, 2012
In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained ...
Zahra Alishahi   +2 more
doaj  

Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

open access: yes, 2018
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments.
Calyam, Prasad   +7 more
core   +1 more source

Escape from TGF‐β‐induced senescence promotes aggressive hallmarks in epithelial hepatocellular carcinoma cells

open access: yesMolecular Oncology, EarlyView.
Chronic TGF‐β exposure drives epithelial HCC cells from a senescent state to a TGF‐β resistant mesenchymal phenotype. This transition is characterized by the loss of Smad3‐mediated signaling, escape from senescence, enhanced invasiveness and metastatic potential, and upregulation of key resistance modulators such as MARK1 and GRM8, ultimately promoting
Minenur Kalyoncu   +11 more
wiley   +1 more source

Mitigation Model for DDoS Attack in Wireless Sensor Networks [PDF]

open access: yes, 2015
A Denial-of-Service is an attack in which the attackers send certain messages to the target systems or target servers with a purpose and intention of shutting down those system or servers.
Gond, Shruti, Nath, Aishwarya
core  

SDNsec: Forwarding Accountability for the SDN Data Plane

open access: yes, 2016
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten   +4 more
core   +1 more source

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

Sinkhole Attack Detection and Prevention using Agent Based Algorithm

open access: yesJournal of University of Shanghai for Science and Technology, 2021
This study presents sinkhole attack detection and prevention using agent-based algorithm. In this algorithm, agents are used to provide information to all node from its reliable neighbors by negotiation in three steps, thus nodes may not be able to pay ...
Ashwini V Jatti   +1 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy