Results 41 to 50 of about 1,723,598 (285)

An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme

open access: yesApplied Sciences, 2021
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh   +3 more
doaj   +1 more source

A Defense Approach of DAD Attack in Stateless Auto Configuration

open access: yesDianxin kexue, 2014
In stateless address auto configuration, node needs to carry out duplicate address detection before using a new IP address. In the detection process, once a malicious node claims that the resolve IP address is occupied, the node's address configuration ...
Guangjia Song, Zhenzhou Ji, Hui Wang
doaj   +2 more sources

SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm

open access: yesInternational Journal of Distributed Sensor Networks, 2012
Resource limitations of sensor nodes in wireless sensor networks (WSN) bound the performance on its implementations. Main concern becomes utilizing these limited resources (CPU, memory, bandwidth, battery) as efficient as possible.
Mujdat Soyturk, Deniz Turgay Altilar
doaj   +1 more source

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

open access: yesIEEE Access, 2021
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan   +4 more
doaj   +1 more source

Machine Learning DDoS Detection for Consumer Internet of Things Devices

open access: yes, 2018
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah   +2 more
core   +1 more source

Relating BIP and Reo [PDF]

open access: yes, 2015
Coordination languages simplify design and development of concurrent systems. Particularly, exogenous coordination languages, like BIP and Reo, enable system designers to express the interactions among components in a system explicitly.
Arbab, Farhad   +3 more
core   +5 more sources

SecSip: A Stateful Firewall for SIP-based Networks [PDF]

open access: yes, 2009
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core   +5 more sources

Digital welfare‐to‐work in the global south: A case of Indonesian pre‐employment card program

open access: yesAustralian Journal of Social Issues, EarlyView.
Abstract The worldwide movement toward digitisation in public service delivery presents a range of opportunities and risks. The potential benefits include improved efficiency, more consistent service delivery decisions and enhanced responsiveness to citizens' demand.
Phuc Nguyen   +3 more
wiley   +1 more source

Design and Development of a UDP-Based Connection-Oriented Multi-Stream One-to-Many Communication Protocol

open access: yesJournal of Telecommunications and Information Technology, 2012
A communication protocol is a set of rules defined formally that describes the format of digital messages and the rules for exchanging those messages in or between computing systems.
Valentin Stanciu   +3 more
doaj   +1 more source

Greedy Intersection-Mode Routing Strategy Protocol for Vehicular Networks

open access: yesComplexity, 2020
The advantages of vehicular ad hoc networks (VANETs) have been acknowledged, particularly during the last decade. Furthermore, VANET-related issues have been addressed by different researchers.
Marwan Mahmoud   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy