Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Haeng-gon Lee"'
Publikováno v:
Symmetry, Vol 9, Iss 9, p 197 (2017)
Anomaly detection systems, also known as intrusion detection systems (IDSs), continuously monitor network traffic aiming to identify malicious actions. Extensive research has been conducted to build efficient IDSs emphasizing two essential characteri
Externí odkaz:
https://doaj.org/article/746ab369135449aea3a4b3e71845b371
Publikováno v:
Wireless Personal Communications. 93:21-34
Among the current botnet countermeasures, DNS sinkhole is known as the best practice in the world. This technique prevents a cyberattack by cutting off the communication between a command and control (C&C) server and zombie PCs (malicious bots). In p
Publikováno v:
Proceedings of the 2017 2nd International Conference on Multimedia Systems and Signal Processing.
In this paper a sender wants to transmit delay sensitive packets to a base station in a single-hop wireless network. Packets arrival to the sending buffer of the sender is Constant Bit Rate (CBR) for audio packets. It is assumed that the transmission
Publikováno v:
IEICE Transactions on Communications. :1803-1813
Publikováno v:
Advances in Computer Science and Ubiquitous Computing ISBN: 9789811030222
CSA/CUTE
CSA/CUTE
According to increasing the wireless network infrastructure and diffusion of mobile devices, the education environments equipped with mobile devices are gradually spreading in the field. The basic method to support stable wireless services in these e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9e1c887d6dd0c4779bbe072ea7b1f724
https://doi.org/10.1007/978-981-10-3023-9_160
https://doi.org/10.1007/978-981-10-3023-9_160
Publikováno v:
Symmetry, Vol 9, Iss 9, p 197 (2017)
Symmetry; Volume 9; Issue 9; Pages: 197
Symmetry; Volume 9; Issue 9; Pages: 197
Anomaly detection systems, also known as intrusion detection systems (IDSs), continuously monitor network traffic aiming to identify malicious actions. Extensive research has been conducted to build efficient IDSs emphasizing two essential characteri
Publikováno v:
Future Generation Information Technology ISBN: 9783642175688
FGIT
FGIT
Cybercrime is threatening our lives more seriously. In particular, the botnet technology is leading most of cybercrime such as distribute denial of service attack, spamming, critical information disclosure. To cope with this problem, various security
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6793c2a886bdfc7ad5ee9520fce26014
https://doi.org/10.1007/978-3-642-17569-5_46
https://doi.org/10.1007/978-3-642-17569-5_46
Publikováno v:
Symmetry (20738994); Sep2017, Vol. 9 Issue 9, p197, 15p