36   Artículos

 
en línea
Radheshyam Singh, Leo Mendiboure, José Soler, Michael Stübert Berger, Tidiane Sylla, Marion Berbineau and Lars Dittmann    
In the near future, there will be a greater emphasis on sharing network resources between roads and railways to improve transportation efficiency and reduce infrastructure costs. This could enable the development of global Cooperative Intelligent Transpo... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici    
The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis    
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hansol Park, Kookjin Kim, Dongil Shin and Dongkyoo Shin    
Recent advances in the Internet and digital technology have brought a wide variety of activities into cyberspace, but they have also brought a surge in cyberattacks, making it more important than ever to detect and prevent cyberattacks. In this study, a ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Almetwally M. Mostafa, Alaa Altheneyan, Abeer Alnuaim and Aseel Alhadlaq    
A computer system generates logs to record all relevant operational data about the system and all operations performed in such systems. System log examination is crucial in the identification of network- and system-level assaults. In comparison to establ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Moritz Platt and Peter McBurney    
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of ?Bitcoin? led to a sharp increase in research activity ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Evangelos D. Spyrou, Ioannis Tsoulos and Chrysostomos Stylios    
Software-Defined Networking (SDN) stands as a pivotal paradigm in network implementation, exerting a profound influence on the trajectory of technological advancement. The critical role of security within SDN cannot be overstated, with distributed denial... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mário Antunes, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado and Tiago Murteira    
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilit... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Adelya Khasanova     Pág. 70 - 77
The purpose of this work is to study and implement algorithms for intelligent process analysis in order to optimize the operation of the OS, as well as to identify abnormal and malicious events using the example of event logs of various operating systems... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Giuseppe Granato, Alessio Martino, Andrea Baiocchi and Antonello Rizzi    
Network traffic analysis, and specifically anomaly and attack detection, call for sophisticated tools relying on a large number of features. Mathematical modeling is extremely difficult, given the ample variety of traffic patterns and the subtle and vari... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »