Cyber attack evaluation dataset for deep packet inspection and analysis [PDF]
To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has
Shishir Kumar Shandilya +3 more
doaj +2 more sources
Brute-force attack mitigation on remote access services via software-defined perimeter [PDF]
Remote Access Services (RAS)—including protocols such as Remote Desktop Protocol (RDP), Secure Shell (SSH), Virtual Network Computing (VNC), Telnet, File Transfer Protocol (FTP), and Secure File Transfer Protocol (SFTP)—are essential to modern network ...
Francis A. Ruambo +6 more
doaj +2 more sources
Rapid NGS Analysis on Google Cloud Platform: Performance Benchmark and User Tutorial. [PDF]
Franzoso E, Santorsola M, Lescai F.
europepmc +1 more source
SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier. [PDF]
Krishna DP +6 more
europepmc +1 more source
BigFlow-NIDS: A large-scale dataset for network intrusion detection in big data environment. [PDF]
Uddin MB, Arefin MS, Hussain MMM.
europepmc +1 more source
HoneyLite: A Lightweight Honeypot Security Solution for SMEs. [PDF]
AlQahtan N +3 more
europepmc +1 more source
Advancing IoT in the lab: Next generation Gateway-Module for laboratory device integration. [PDF]
Lange F, Beutel S.
europepmc +1 more source
Application of artificial intelligence medical imaging aided diagnosis system in the diagnosis of pulmonary nodules. [PDF]
Yang Y, Wang P, Yu C, Zhu J, Sheng J.
europepmc +1 more source
Evaluating Plant Drought Resistance with a Raspberry Pi and Time-lapse Photography. [PDF]
Ginzburg DN, Rhee SY.
europepmc +1 more source
Morphological Changes in PEDOT:PSS under Electrolytes, Dopamine, and PEG-400 Exposure: A Molecular Simulation Perspective. [PDF]
G Guruge A, Makki H, Troisi A.
europepmc +1 more source

