Results 91 to 100 of about 36,499 (202)

AI-Based Approach to Firewall Rule Refinement on High-Performance Computing Service Network

open access: yesApplied Sciences
High-performance computing (HPC) relies heavily on network security, particularly when supercomputing services are provided via public networks. As supercomputer operators, we introduced several security devices, such as anti-DDoS, intrusion prevention ...
Jae-Kook Lee, Taeyoung Hong, Gukhua Lee
doaj   +1 more source

Automated collection of imaging and phenotypic data to centralized and distributed data repositories

open access: yesFrontiers in Neuroinformatics, 2014
Accurate data collection at the ground level is vital to the integrity of neuroimaging research. Similarly important is the ability to connect and curate data in order to make it meaningful and sharable with other investigators.
Margaret D King   +10 more
doaj   +1 more source

Enhancing Application Security Using Web Application Firewalls and AI

open access: yesInternational Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 2023
Businesses across all sectors focus on web application security as their primary concern because of how the current digital era operates. New threats targeting web applications increase the complexity of exploiting system weaknesses, causing multiple destructive attacks that harm financial stability and reputation losses.
openaire   +1 more source

Анализ защищенности web-приложения на основе моделирования сетевых атак

open access: yesИнформатика. Экономика. Управление
В статье рассматриваются ключевые угрозы безопасности современных веб-приложений, такие как межсайтовый скриптинг (XSS), подделка межсайтовых запросов (CSRF), фишинг, атаки типа "отказ в обслуживании" (DoS), утечки данных и несанкционированный доступ ...
М. Д. Окулов   +1 more
doaj   +1 more source

Enabling the Internet White Pages Service -- the Directory Guardian [PDF]

open access: yes, 1998
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to gain access to either their Intranet or their directory database.
Chadwick, David W., Young, Andrew J.
core  

Firewalls: A Balance Between Security and Accesibility [PDF]

open access: yes, 2018
Access control lists and firewall rules are intended to prevent access to certain resources on a computer network while allowing access to other resources.
Ecker, Nathan
core   +1 more source

Technical Report on Deploying a highly secured OpenStack Cloud Infrastructure using BradStack as a Case Study

open access: yes, 2017
Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives.
Al-Shaidy, Al Noaman M. K.   +6 more
core  

Intrusion detection mechanisms for VoIP applications [PDF]

open access: yes, 2006
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference ...
Festor, Olivier   +2 more
core   +3 more sources

Vulnerability-Based Enrichment of Türkiye-Specific Cyber Threat Intelligence: Proactive Threat Hunting and Critical Vulnerability Analysis with TR-CERT and Exploit-DB Integration

open access: yesGüvenlik Stratejileri Dergisi
This study introduces a framework for cyber threat intelligence aimed at enhancing Türkiye’s proactive cybersecurity capabilities, specifically addressing security vulnerabilities.
Hüseyin Parmaksız
doaj   +1 more source

Penetration Testing pada Kerentanan Keamanan Sistem PELAKAT Menggunakan SQL Injection

open access: yesJurnal Teknologi dan Sistem Informasi
Penetration Testing bertujuan untuk mengidentifikasi kerentanan sistem dengan cara mensimulasikan serangan dengan teknik tertentu seperti SQL Injection.
Khairul, Asrul Abdullah, Sucipto Sucipto
doaj   +1 more source

Home - About - Disclaimer - Privacy