81   Artículos

 
en línea
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva    
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ted H. Szymanski    
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi... ver más
Revista: Information    Formato: Electrónico

 
en línea
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo    
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad... ver más
Revista: Information    Formato: Electrónico

 
en línea
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar    
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh    
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang    
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Ruikui Ma, Qiuqian Wang, Xiangxi Bu and Xuebin Chen    
With the development of the Internet of Things, a huge number of devices are connected to the network, network traffic is exhibiting massive and low latency characteristics. At the same time, it is becoming cheaper and cheaper to launch DDoS attacks, and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam    
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Furkat Safarov, Mainak Basak, Rashid Nasimov, Akmalbek Abdusalomov and Young Im Cho    
In the rapidly evolving landscape of internet usage, ensuring robust cybersecurity measures has become a paramount concern across diverse fields. Among the numerous cyber threats, denial of service (DoS) and distributed denial of service (DDoS) attacks p... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »