Results 91 to 100 of about 8,112 (198)
Application of the STRIDE framework in a microservice application for electronic business [PDF]
In this paper, we identify security threats in a microservice-based application using the STRIDE framework. The study addresses the question of how the architecture of STRIDE procedure, which is aligned with Data Flow Diagram (DFD) trust boundaries, can ...
Milic Tamara +2 more
doaj +1 more source
Recent Advances on Jamming and Spoofing Detection in GNSS
Increased interest in the development and integration of navigation and positioning services into a wide range of receivers makes them susceptible to a variety of security attacks such as Global Navigation Satellite Systems (GNSS) jamming and spoofing ...
Katarina Radoš +2 more
doaj +1 more source
Address Resolution Protocol (ARP) spoofing has been a long-standing problem with no clear remedy until now. The attacks can be launched easily utilizing an enormous number of publicly available tools on the web; however, they are extremely tough to ...
Laurent Patrice +2 more
doaj +1 more source
ARP Spoof Detection and Mitigation
Wireless Local Area Networks (WLANs) have become ubiquitous in modern connectivity landscapes, offering convenience and flexibility. However, they also introduce vulnerabilities, including Address Resolution Protocol (ARP) spoofing attacks, which exploit the inherent characteristics of WLANs to compromise network security. The proposed method begins by
Prema Arokiya Mary G +3 more
openaire +1 more source
Design and Implement of Intrusion Prevention System Based on Snort and IP Tables
In the era of rapid advancement in communication and computer technology, network security has become a crucial issue, especially in wireless networks.
Lutfi Dwi Naldi, Apro Siswanto
doaj +1 more source
Vehicular Communication Networks (VCNs) are essential for autonomous vehicles and Intelligent Transportation Systems but face challenges in security vulnerabilities and data sparsity.
Muhammad Danish Khan +3 more
doaj +1 more source
Multi-modem-based FHSS-drone takeover with precision spoofing
Traditional radio frequency (RF)-based anti-drone technologies focus on jam-ming the command and control (C2) RF signal or global navigation satellite system (GNSS) signal of a target drone.
Jae Gu Kang, Byeong Cheol Choi
doaj +1 more source
Spoofing Mitigation of GPS Receiver using Least Mean Squares-Based Adaptive Filter
The Global Positioning System (GPS) signals are very weak signal over wireless channels, so they are vulnerable to in-band interferences. Therefore, even a low-power interference can easily spoof GPS receivers.
M. R. Mosavi, Z. Shokhmzan
doaj
The increasing reliance of Vehicular Ad-hoc Networks (VANETs) on the BeiDou Navigation Satellite System (BDS) for precise positioning and timing information has raised significant concerns regarding their vulnerability to spoofing attacks.
Usman Tariq
doaj +1 more source
Contactless Fingerprint Recognition and Fingerprint Spoof Mitigation using CNN
Contactless identification of fingerprints has gained considerable attention as it can offer more hygienic and accurate personal identification. Despite these benefits, contactless 2D imagery often leads to partial 2D fingerprints as it requires relatively higher user cooperation during contactless 2D imagery.
openaire +1 more source

