Results 91 to 100 of about 36,499 (202)
AI-Based Approach to Firewall Rule Refinement on High-Performance Computing Service Network
High-performance computing (HPC) relies heavily on network security, particularly when supercomputing services are provided via public networks. As supercomputer operators, we introduced several security devices, such as anti-DDoS, intrusion prevention ...
Jae-Kook Lee, Taeyoung Hong, Gukhua Lee
doaj +1 more source
Automated collection of imaging and phenotypic data to centralized and distributed data repositories
Accurate data collection at the ground level is vital to the integrity of neuroimaging research. Similarly important is the ability to connect and curate data in order to make it meaningful and sharable with other investigators.
Margaret D King +10 more
doaj +1 more source
Enhancing Application Security Using Web Application Firewalls and AI
Businesses across all sectors focus on web application security as their primary concern because of how the current digital era operates. New threats targeting web applications increase the complexity of exploiting system weaknesses, causing multiple destructive attacks that harm financial stability and reputation losses.
openaire +1 more source
Анализ защищенности web-приложения на основе моделирования сетевых атак
В статье рассматриваются ключевые угрозы безопасности современных веб-приложений, такие как межсайтовый скриптинг (XSS), подделка межсайтовых запросов (CSRF), фишинг, атаки типа "отказ в обслуживании" (DoS), утечки данных и несанкционированный доступ ...
М. Д. Окулов +1 more
doaj +1 more source
Enabling the Internet White Pages Service -- the Directory Guardian [PDF]
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to gain access to either their Intranet or their directory database.
Chadwick, David W., Young, Andrew J.
core
Firewalls: A Balance Between Security and Accesibility [PDF]
Access control lists and firewall rules are intended to prevent access to certain resources on a computer network while allowing access to other resources.
Ecker, Nathan
core +1 more source
Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives.
Al-Shaidy, Al Noaman M. K. +6 more
core
Intrusion detection mechanisms for VoIP applications [PDF]
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference ...
Festor, Olivier +2 more
core +3 more sources
This study introduces a framework for cyber threat intelligence aimed at enhancing Türkiye’s proactive cybersecurity capabilities, specifically addressing security vulnerabilities.
Hüseyin Parmaksız
doaj +1 more source
Penetration Testing pada Kerentanan Keamanan Sistem PELAKAT Menggunakan SQL Injection
Penetration Testing bertujuan untuk mengidentifikasi kerentanan sistem dengan cara mensimulasikan serangan dengan teknik tertentu seperti SQL Injection.
Khairul, Asrul Abdullah, Sucipto Sucipto
doaj +1 more source

