Zobrazeno 1 - 10
of 2 970
pro vyhledávání: '"Intrusion Prevention"'
Autor:
Artem Tetskyi, Dmytro Uzun
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 3, Pp 166-174 (2024)
Many financial institutions and payment solution providers are required to comply with PCI DSS (Payment Card Industry Data Security Standard). Such requirements are understandable, as compliance helps in reducing the risks of data leaks and financial
Externí odkaz:
https://doaj.org/article/c8d430028481488f8c4d4ddabab57039
Publikováno v:
Measurement: Sensors, Vol 34, Iss , Pp 101263- (2024)
By linking objects globally, the Internet of Things (IoT) has transformed technology with the goal of achieving an unparalleled degree of intelligence that will benefit mankind in many areas. Resilient applications in safety, healthcare, and industri
Externí odkaz:
https://doaj.org/article/861c9ad685cd40a6965b4fbe6ff45421
Publikováno v:
IEEE Access, Vol 12, Pp 160653-160666 (2024)
Many interconnected IoT devices driven by imperatives of efficiency and convenience often lack adequate security measures, making them susceptible to exploitation by cyber-criminals. Effective network security necessitates meticulous intrusion detect
Externí odkaz:
https://doaj.org/article/095a91e18beb429d9548b5bf6eb83ef7
Publikováno v:
IEEE Access, Vol 12, Pp 80930-80949 (2024)
The cultural shift of work from on-premises to remote home offices allows hackers to access corporate data by compromising devices attached to home-based broadband routers. Currently, home devices are growing at an exponential rate, e.g., in the form
Externí odkaz:
https://doaj.org/article/b7f3f86e408641c983b28427132daf5a
Autor:
Muhammad Sheeraz, Muhammad Hanif Durad, Shahzaib Tahir, Hasan Tahir, Saqib Saeed, Abdullah M. Almuhaideb
Publikováno v:
IEEE Access, Vol 12, Pp 61848-61859 (2024)
Intrusion Prevention Systems (IPS), capable of preventing the organizational network from a cyber-attack in addition to detecting it, are widely adopted by organizations to protect their networks from unauthorized access, attacks, and malicious activ
Externí odkaz:
https://doaj.org/article/14e4af78d3704855b16228b8d96f8885
Autor:
Hassan Jalil Hadi, Mubashir Adnan, Yue Cao, Faisal Bashir Hussain, Naveed Ahmad, Mohammed Ali Alshara, Yasir Javed
Publikováno v:
Technologies, Vol 12, Iss 8, p 122 (2024)
The development of new technologies has significantly enhanced the monitoring and analysis of network traffic. Modern solutions like the Extended Berkeley Packet Filter (eBPF) demonstrate a clear advancement over traditional techniques, allowing for
Externí odkaz:
https://doaj.org/article/6b7ecb9f2b7b4f52b537028c7ceb8b2d
Autor:
Zhang, Qisheng
In this dissertation research, we design and analyze resilient cyber-physical systems (CPSs) under high network dynamics, adversarial attacks, and various uncertainties. We focus on three key system attributes to build resilient CPSs by developing a
Externí odkaz:
https://hdl.handle.net/10919/117329
Publikováno v:
Electronic Research Archive, Vol 31, Iss 4, Pp 1876-1896 (2023)
Due to the complexities of systems thinking and the communication between independent Cyber-Physical Systems (CPSs) areas through accumulative expansion, several security threats are posed, such as deception of channels for information sharing, hardw
Externí odkaz:
https://doaj.org/article/c52d4bef97cb4199a795636c1f143e7a
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 1, Pp 111-124 (2023)
With the rapid development of the Internet of Things (IoT), there are several challenges pertaining to security in IoT applications. Compared with the characteristics of the traditional Internet, the IoT has many problems, such as large assets, compl
Externí odkaz:
https://doaj.org/article/68ecbac2564b4e36aa39b8c09f759e09
Autor:
Noe M. Yungaicela-Naula, Cesar Vargas-Rosales, Jesus Arturo Perez-Diaz, Eduardo Jacob, Carlos Martinez-Cagnazzo
Publikováno v:
IEEE Access, Vol 11, Pp 46820-46831 (2023)
Slow-read Distributed Denial of Service (DDoS) attacks are complex to detect and mitigate. Although existing tools allow one to identify these attacks, these tools mainly generate alerts. However, in real scenarios, a large number of attack detection
Externí odkaz:
https://doaj.org/article/67cff276d3a944e6b6c7a0141fbe978f