Results 101 to 110 of about 36,499 (202)
SDN based Network Function Parallelism in Cloud
Network function virtualization (NFV) based service function chaining (SFC) allows the provisioning of various security and traffic engineering applications in a cloud network.
Chowdhary, Ankur, Huang, Dijiang
core
Design and Hardening of an MQTT Broker Server on AWS EC2 for Secure IoT Communication
The rapid growth of Internet of Things (IoT) applications has increased the reliance on lightweight communication protocols such as Message Queuing Telemetry Transport (MQTT), while simultaneously raising security risks due to the exposure of broker ...
Deo Triyanuar Putra +2 more
doaj +1 more source
АНАЛІЗ БЕЗПЕКИ ЛАНЦЮГІВ ПОСТАЧАННЯ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ
У статті досліджено актуальну проблему забезпечення безпеки програмних інтерфейсів (API) у хмарних середовищах в контексті захисту ланцюгів постачання програмного забезпечення. Враховуючи поширення мікросервісних архітектур та відкритих REST/GraphQL API,
Андрій Скіп +1 more
doaj +1 more source
Web Application Firewalls: A Comprehensive Bibliometric Review
Abstract-Web Application Firewalls (WAFs) have been characterized as essential in defending web-based systems against standard attacks of the application-layer (SQL injection and cross-site scripting). In order to consider the progress and current research tendencies in this area, this paper provides a broad bibliometric search through the literature ...
null Raghvendra Singh +3 more
openaire +1 more source
MAC OS X VERSION 10.5 “LEOPARD” [PDF]
Mac OS X version 10.5 “Leopard” is the sixth major release of Mac OS X. This operating system is the successor of Mac OS X v10.4 "Tiger".
Alexandru Gavril Bardas
core
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong +2 more
core
Redundant firewalls for web applications
The websites of small, medium and large companies are a great competitive advantage in the business world. Companies invest a considerable amount of money to ensure they appear on top of the ranks when users seek for goods and services in search engines.
openaire +1 more source
NetworkGuard: An Edge-Based Virtual Network Sensing Architecture for Real-Time Security Monitoring in Smart Home Environments. [PDF]
El Khaled D +3 more
europepmc +1 more source

