Zobrazeno 1 - 10
of 618
pro vyhledávání: '"ARP spoofing"'
Autor:
Vanlalruata Hnamte, Jamal Hussain
Publikováno v:
Telematics and Informatics Reports, Vol 14, Iss , Pp 100129- (2024)
The proliferation of Software-Defined Networks (SDNs) has introduced unparalleled flexibility and efficiency to network management, but at the same time, it has introduced new challenges in securing network infrastructures. Among these challenges, Ad
Externí odkaz:
https://doaj.org/article/5e67e8cb6d6d41f39b1d9f3861c627ff
Publikováno v:
IEEE Access, Vol 12, Pp 80255-80265 (2024)
Address Resolution Protocol (ARP) spoofing has been a long-standing problem with no clear remedy until now. The attacks can be launched easily utilizing an enormous number of publicly available tools on the web; however, they are extremely tough to c
Externí odkaz:
https://doaj.org/article/7cfe49a41a4248938c61818cc2f71825
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 7, Iss 2, Pp 208-217 (2023)
According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%. Several difficulties with examining network systems have been
Externí odkaz:
https://doaj.org/article/76341f462ca64071b3d85079a61e1a99
Autor:
Bhattacharjya Aniruddha
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 32, Iss 3, Pp 403-413 (2022)
Blockchain-based cyber-physical systems (CPSs) and the blockchain Internet of things (BIoT) are two major focuses of the modern technological revolution. Currently we have security attacks like distributed denial-of-service (DDoS), address resolution
Externí odkaz:
https://doaj.org/article/3cc596cf5c774e5cb106b4d17b7dee18
Autor:
Sabah M. Morsy, Dalia Nashat
Publikováno v:
IEEE Access, Vol 10, Pp 49142-49153 (2022)
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an unauthorized third party secretly accesses the communication between t
Externí odkaz:
https://doaj.org/article/deaee6905c524daabfda53e26e0dbea4
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 21, Iss 3, Pp 401-409 (2021)
The work focuses on software-defined network security, as it was always one of these foremost critical concerns due to the centralized nature in SDN architecture where many serious attacks in traditional networks still appear in SDN networks such as
Externí odkaz:
https://doaj.org/article/da5a0e2e3a474fce95ed797584179c20
Publikováno v:
Systems, Vol 11, Iss 4, p 211 (2023)
Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to Smart Factory solutions and delivers insights. As a result, a complex and dynamic network with a vulnerability inherited from the Internet becomes an attrac
Externí odkaz:
https://doaj.org/article/33f477fa3c3e423cbcd3f4a80e98d5ca
Autor:
Abhishek Guru, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman, Arvind Yadav
Publikováno v:
Applied Sciences, Vol 13, Iss 4, p 2604 (2023)
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionall
Externí odkaz:
https://doaj.org/article/a0764cac084a4ae48a1ff801bc04c78a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.