Results 101 to 110 of about 36,499 (202)

SDN based Network Function Parallelism in Cloud

open access: yes, 2018
Network function virtualization (NFV) based service function chaining (SFC) allows the provisioning of various security and traffic engineering applications in a cloud network.
Chowdhary, Ankur, Huang, Dijiang
core  

Design and Hardening of an MQTT Broker Server on AWS EC2 for Secure IoT Communication

open access: yesJurnal Jaringan Telekomunikasi
The rapid growth of Internet of Things (IoT) applications has increased the reliance on lightweight communication protocols such as Message Queuing Telemetry Transport (MQTT), while simultaneously raising security risks due to the exposure of broker ...
Deo Triyanuar Putra   +2 more
doaj   +1 more source

АНАЛІЗ БЕЗПЕКИ ЛАНЦЮГІВ ПОСТАЧАННЯ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ

open access: yesКібербезпека: освіта, наука, техніка
У статті досліджено актуальну проблему забезпечення безпеки програмних інтерфейсів (API) у хмарних середовищах в контексті захисту ланцюгів постачання програмного забезпечення. Враховуючи поширення мікросервісних архітектур та відкритих REST/GraphQL API,
Андрій Скіп   +1 more
doaj   +1 more source

Web Application Firewalls: A Comprehensive Bibliometric Review

open access: yesInternational Journal of Latest Technology in Engineering Management & Applied Science
Abstract-Web Application Firewalls (WAFs) have been characterized as essential in defending web-based systems against standard attacks of the application-layer (SQL injection and cross-site scripting). In order to consider the progress and current research tendencies in this area, this paper provides a broad bibliometric search through the literature ...
null Raghvendra Singh   +3 more
openaire   +1 more source

MAC OS X VERSION 10.5 “LEOPARD” [PDF]

open access: yes
Mac OS X version 10.5 “Leopard” is the sixth major release of Mac OS X. This operating system is the successor of Mac OS X v10.4 "Tiger".
Alexandru Gavril Bardas
core  

Towards a Layered Architectural View for Security Analysis in SCADA Systems

open access: yes, 2012
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong   +2 more
core  

Redundant firewalls for web applications

open access: yes, 2016
The websites of small, medium and large companies are a great competitive advantage in the business world. Companies invest a considerable amount of money to ensure they appear on top of the ranks when users seek for goods and services in search engines.
openaire   +1 more source

Ontology-based policy translation [PDF]

open access: yes, 2009
A. Mayer   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy