Zobrazeno 1 - 10
of 94
pro vyhledávání: '"Vassilios G. Vassilakis"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 2, Iss 1, Pp 124-153 (2022)
Routing attacks are a major security issue for Internet of Things (IoT) networks utilising routing protocols, as malicious actors can overwhelm resource-constrained devices with denial-of-service (DoS) attacks, notably rank and blackhole attacks. In
Externí odkaz:
https://doaj.org/article/9553b1b2047e46fa95329c9b82fe1fff
Publikováno v:
Future Internet, Vol 15, Iss 5, p 170 (2023)
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other
Externí odkaz:
https://doaj.org/article/7df54e447b3945a68dc78b52f3c45edf
Publikováno v:
IEEE Access, Vol 9, Pp 28039-28058 (2021)
In the last decade, many ransomware attacks had the ability to spread within local networks or even outside them. At the same time, software defined networking (SDN) has provided a major boost to networks by transferring intelligence from network dev
Externí odkaz:
https://doaj.org/article/add09f255e894a008bb348237f2b6362
Publikováno v:
Sensors, Vol 23, Iss 5, p 2605 (2023)
Currently, within the world, cybercrime is becoming increasingly rampant—often targeting civil infrastructure like power stations and other critical systems. A trend that is being noticed with these attacks is their increased use of embedded device
Externí odkaz:
https://doaj.org/article/6dd3be1cb3c04925a08801204ae95589
Publikováno v:
IET Networks, Vol 7, Iss 4, Pp 242-247 (2018)
The authors consider a link accommodating batched Poisson arriving calls of different service classes. A batch of generally distributed number of calls arrive to the link at exponentially distributed time‐points. Each call is treated separately fro
Externí odkaz:
https://doaj.org/article/b425a0eae4ab47f184bd78787d5d623b
Publikováno v:
IET Networks, Vol 7, Iss 4, Pp 233-241 (2018)
The authors propose two multirate teletraffic loss models in a two‐link system that accommodates Poisson arriving calls from different service‐classes with different bandwidth‐per‐call requirements. Each link has two thresholds which refer to
Externí odkaz:
https://doaj.org/article/ed5addf881b04083b9e2b10d19e0a527
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 2 (2019)
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a popular routing protocol used in wireless sensor networks and in the Internet of Things (IoT). RPL was standardized by the IETF in 2012 and has been designed for devices with limited r
Externí odkaz:
https://doaj.org/article/2b92112002a04937986389a45f217d68
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2019)
In recent years, we have been experiencing fast proliferation of different types of ransomware targeting home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware relies on sophisticated infection, per
Externí odkaz:
https://doaj.org/article/b0879d103b014af8be90c0983c3565d8
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2018)
We consider a two-link system that accommodates Poisson arriving calls from different service-classes and propose a multirate teletraffic loss model for its analysis. Each link has two thresholds, which refer to the number of inservice calls in the
Externí odkaz:
https://doaj.org/article/199d1fc6159d40d5980aabd28dc858ad
Publikováno v:
Robotics, Vol 8, Iss 3, p 50 (2019)
Online Social Networks (OSNs), such as Facebook and Twitter, have become a very important part of many people’s daily lives. Unfortunately, the high popularity of these platforms makes them very attractive to spammers. Machine learning (ML) techniq
Externí odkaz:
https://doaj.org/article/3946b2611f9143f381a7abf1d55821b2