Zobrazeno 1 - 10
of 56
pro vyhledávání: '"005.8 Data security"'
Publikováno v:
Nonlinear Dynamics. 99:3065-3087
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocki
Publikováno v:
Digital Investigation. 29:118-128
The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its lo
Publikováno v:
IEEE Access, Vol 7, Pp 172045-172054 (2019)
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fas
Autor:
Rahim Khan, Zhiyuan Tan, Muhammad Usman, Yongzhao Xu, Tao Han, Mian Ahmad Jan, Syed Roohullah Jan
Software Dened Network (SDN) and Network Virtualization (NV) are emerged paradigms that simplied the control and management of the next generation networks, most importantly, Internet of Things (IoT), Cloud Computing, and Cyber-Physical Systems. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::675946f3e8d28a55b764fe401d65447f
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6ad393c38d693132db329ba57dbbe4f0
Publikováno v:
Information & Computer Security. 26:637-652
Purpose The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period from January 03, 2013, to December 29, 2017. Design/methodology/approach The empirical analysis was performed in two ways: cross-section and indu
Autor:
William J Buchanan, Rameez Asif
Publikováno v:
Security and Communication Networks, Vol 2017 (2017)
There is current significant interest in Fiber-to-the-Home (FTTH) networks, that is, end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future, it is envisaged that
Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=core_ac_uk__::cafcb8f6ad81abfd841ed3d6f5cd9a7f
With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving solutions, users need to transmit the location query data to an untrusted locatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=core_ac_uk__::6f4cd931fb389c0fff3d584274e842b4
Publikováno v:
Li, W, Meng, W, Tan, Z & Xiang, Y 2019, ' Design of multi-view based email classification for IoT systems via semi-supervised learning ', Journal of Network and Computer Applications, vol. 128, pp. 56-63 . https://doi.org/10.1016/j.jnca.2018.12.002
Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT systems, email classification is an essential mechanism to classify spam and l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c1f78a9ff380d8e7e9c0e1248a4b909b