Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Nor Masri Sahri"'
Publikováno v:
IEEE Access, Vol 9, Pp 121975-121995 (2021)
Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deployin
Externí odkaz:
https://doaj.org/article/054ff0ec9bbc463daf048abb016481a4
Publikováno v:
Sensors, Vol 21, Iss 18, p 6163 (2021)
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security
Externí odkaz:
https://doaj.org/article/72039f427d68447d8e4789bf492d1cc2
Publikováno v:
IEEE Access, Vol 9, Pp 121975-121995 (2021)
Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deployin
Publikováno v:
2022 IEEE 12th Symposium on Computer Applications & Industrial Electronics (ISCAIE).
Publikováno v:
Sensors (Basel, Switzerland)
Sensors, Vol 21, Iss 6163, p 6163 (2021)
Sensors, Vol 21, Iss 6163, p 6163 (2021)
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security
Publikováno v:
2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT).
It is predicted that, the number of connected Internet of Things (IoT) devices will rise to 38.6 billion by 2025 and an estimated 50 billion by 2030. The increased deployment of IoT devices into diverse areas of our life has provided us with signific
Autor:
Nor Masri Sahri, Koji Okamura
Publikováno v:
CFI
As DNS packet are mostly UDP-based, make it as a perfect tool for hackers to launch a well-known type of distributed denial of service (DDoS). The purpose of this attack is to saturate the DNS server availability and resources. This type of attack us
Collaborative Spoofing Detection and Mitigation -- SDN Based Looping Authentication for DNS Services
Autor:
Koji Okamura, Nor Masri Sahri
Publikováno v:
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed denial of service (DDoS). The purpose of this attack is to saturate the DNS server availability and resources with "unwanted" DNS
Autor:
Koji Okamura, Nor Masri Sahri
Publikováno v:
CFI
Path protection and restoration mechanism must be implemented to provide a reliable network. Whenever there is a link failure in the network, OpenFlow controller can react by computing a new backup path and provide the information to the affected nod
Autor:
Nor Masri Sahri, Koji Okamura
Publikováno v:
Proceedings of the Asia-Pacific Advanced Network. 40:57
In traditional approach, extracting important features for the application to analyze the anomaly detection problem, introduce significant overhead on the way of switch handling. Furthermore, high volumes of network traffic introduce notable issues t