Results 51 to 60 of about 83,142 (315)
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis.
Asoni, Daniele E.+5 more
core +1 more source
PROVIDE: hiding from automated network scans with proofs of identity [PDF]
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core +3 more sources
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks.
Saluja, Krishan Kumar+2 more
core +2 more sources
A new method for improving security in MANETs AODV Protocol [PDF]
In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained ...
Zahra Alishahi+2 more
doaj
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments.
Calyam, Prasad+7 more
core +1 more source
Chronic TGF‐β exposure drives epithelial HCC cells from a senescent state to a TGF‐β resistant mesenchymal phenotype. This transition is characterized by the loss of Smad3‐mediated signaling, escape from senescence, enhanced invasiveness and metastatic potential, and upregulation of key resistance modulators such as MARK1 and GRM8, ultimately promoting
Minenur Kalyoncu+11 more
wiley +1 more source
Mitigation Model for DDoS Attack in Wireless Sensor Networks [PDF]
A Denial-of-Service is an attack in which the attackers send certain messages to the target systems or target servers with a purpose and intention of shutting down those system or servers.
Gond, Shruti, Nath, Aishwarya
core
SDNsec: Forwarding Accountability for the SDN Data Plane
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten+4 more
core +1 more source
Active router approach to defeating denial-of-service attacks in networks [PDF]
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core +1 more source
Sinkhole Attack Detection and Prevention using Agent Based Algorithm
This study presents sinkhole attack detection and prevention using agent-based algorithm. In this algorithm, agents are used to provide information to all node from its reliable neighbors by negotiation in three steps, thus nodes may not be able to pay ...
Ashwini V Jatti+1 more
semanticscholar +1 more source