Results 1 to 10 of about 824 (89)

Cyber attack evaluation dataset for deep packet inspection and analysis [PDF]

open access: yesData in Brief, 2023
To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has
Shishir Kumar Shandilya   +3 more
doaj   +2 more sources

Brute-force attack mitigation on remote access services via software-defined perimeter [PDF]

open access: yesScientific Reports
Remote Access Services (RAS)—including protocols such as Remote Desktop Protocol (RDP), Secure Shell (SSH), Virtual Network Computing (VNC), Telnet, File Transfer Protocol (FTP), and Secure File Transfer Protocol (SFTP)—are essential to modern network ...
Francis A. Ruambo   +6 more
doaj   +2 more sources

SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier. [PDF]

open access: yesSci Rep, 2023
Krishna DP   +6 more
europepmc   +1 more source

HoneyLite: A Lightweight Honeypot Security Solution for SMEs. [PDF]

open access: yesSensors (Basel)
AlQahtan N   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy