Results 91 to 100 of about 8,112 (198)

Application of the STRIDE framework in a microservice application for electronic business [PDF]

open access: yesJournal of Engineering Management and Competitiveness
In this paper, we identify security threats in a microservice-based application using the STRIDE framework. The study addresses the question of how the architecture of STRIDE procedure, which is aligned with Data Flow Diagram (DFD) trust boundaries, can ...
Milic Tamara   +2 more
doaj   +1 more source

Recent Advances on Jamming and Spoofing Detection in GNSS

open access: yesSensors
Increased interest in the development and integration of navigation and positioning services into a wide range of receivers makes them susceptible to a variety of security attacks such as Global Navigation Satellite Systems (GNSS) jamming and spoofing ...
Katarina Radoš   +2 more
doaj   +1 more source

A Novel Mechanism for Detection of Address Resolution Protocol Spoofing Attacks in Large-Scale Software-Defined Networks

open access: yesIEEE Access
Address Resolution Protocol (ARP) spoofing has been a long-standing problem with no clear remedy until now. The attacks can be launched easily utilizing an enormous number of publicly available tools on the web; however, they are extremely tough to ...
Laurent Patrice   +2 more
doaj   +1 more source

ARP Spoof Detection and Mitigation

open access: yes
Wireless Local Area Networks (WLANs) have become ubiquitous in modern connectivity landscapes, offering convenience and flexibility. However, they also introduce vulnerabilities, including Address Resolution Protocol (ARP) spoofing attacks, which exploit the inherent characteristics of WLANs to compromise network security. The proposed method begins by
Prema Arokiya Mary G   +3 more
openaire   +1 more source

Design and Implement of Intrusion Prevention System Based on Snort and IP Tables

open access: yesJournal of Computing Research and Innovation
In the era of rapid advancement in communication and computer technology, network security has become a crucial issue, especially in wireless networks.
Lutfi Dwi Naldi, Apro Siswanto
doaj   +1 more source

Context-Aware Intrusion Detection in Vehicular Communication Networks: Enhanced Attack Modeling and Dataset

open access: yesApplied Artificial Intelligence
Vehicular Communication Networks (VCNs) are essential for autonomous vehicles and Intelligent Transportation Systems but face challenges in security vulnerabilities and data sparsity.
Muhammad Danish Khan   +3 more
doaj   +1 more source

Multi-modem-based FHSS-drone takeover with precision spoofing

open access: yesETRI Journal
Traditional radio frequency (RF)-based anti-drone technologies focus on jam-ming the command and control (C2) RF signal or global navigation satellite system (GNSS) signal of a target drone.
Jae Gu Kang, Byeong Cheol Choi
doaj   +1 more source

Spoofing Mitigation of GPS Receiver using Least Mean Squares-Based Adaptive Filter

open access: yesIranian Journal of Electrical and Electronic Engineering, 2015
The Global Positioning System (GPS) signals are very weak signal over wireless channels, so they are vulnerable to in-band interferences. Therefore, even a low-power interference can easily spoof GPS receivers.
M. R. Mosavi, Z. Shokhmzan
doaj  

PSAU-Defender: A Lightweight and Low-Cost Comprehensive Framework for BeiDou Spoofing Mitigation in Vehicular Networks

open access: yesWorld Electric Vehicle Journal
The increasing reliance of Vehicular Ad-hoc Networks (VANETs) on the BeiDou Navigation Satellite System (BDS) for precise positioning and timing information has raised significant concerns regarding their vulnerability to spoofing attacks.
Usman Tariq
doaj   +1 more source

Contactless Fingerprint Recognition and Fingerprint Spoof Mitigation using CNN

open access: yesInternational Journal of Recent Technology and Engineering, 2019
Contactless identification of fingerprints has gained considerable attention as it can offer more hygienic and accurate personal identification. Despite these benefits, contactless 2D imagery often leads to partial 2D fingerprints as it requires relatively higher user cooperation during contactless 2D imagery.
openaire   +1 more source

Home - About - Disclaimer - Privacy