21   Artículos

 
en línea
Fahad M. Alotaibi and Vassilios G. Vassilakis    
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev and Ivaylo Stoyanov    
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The num... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jamal Khudair Madhloom, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen and Saad M. Darwish    
Due to the Internet?s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secur... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer    
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Haruna Umar Adoga and Dimitrios P. Pezaros    
Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastru... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Chun-Liang Lee, Guan-Yu Lin and Yaw-Chung Chen    
Advanced network services, such as firewalls, policy-based routing, and virtual private networks, must rely on routers to classify packets into different flows based on packet headers and predefined filter tables. When multiple filters are overlapped, co... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Michael Alicea and Izzat Alsmadi    
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Vassilios Moussas and Antonios Andreatos    
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ahmed Mahfouz, Abdullah Abuhussein, Deepak Venugopal and Sajjan Shiva    
Due to the extensive use of computer networks, new risks have arisen, and improving the speed and accuracy of security mechanisms has become a critical need. Although new security tools have been developed, the fast growth of malicious activities continu... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Alexandros Fakis, Georgios Karopoulos and Georgios Kambourakis    
To establish peer-to-peer connections and achieve real-time web-based communication, the Web Real-Time Communication (WebRTC) framework requires address information of the communicating peers. This means that users behind, say, Network Address Translatio... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »