|
|
|
|
|
Irawan Dwi Wahyono,Djoko Saryono,Khoirudin Asfani,Muhammad Ashar,Sunarti Sunarti
Pág. pp. 29 - 40
Computer network security has become an important issue in recent decades, the government and several international organizations have invested in professional education and training for computer network security. In addition, with the increasing inciden...
ver más
|
|
|
|
|
|
|
|
|
|
|
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne...
ver más
|
|
|
|
|
|
|
|
|
|
|
Muaayed Al-Rawi
Pág. 73 - 76
Mobile ad-hoc network (MANET) security is the most significant importance for the infrastructure working of network. Privacy and integrity of the information, network services can be accomplished by guaranteeing that security issues. The mobile ad hoc ne...
ver más
|
|
|
|
|
|
|
|
|
|
|
Clement Agbeboaye,France O. Akpojedje,Joshua Okoekhian
There is a geometric growth in the manufacturing and sales of wireless network devices presently. This growth is not connected with the advantages ushered in by wireless network e.g user mobility, the flexibility of the network, enable network connection...
ver más
|
|
|
|
|
|
|
|
|
|
|
Rong Shi,Wang Xi
Pág. pp. 48 - 59
In order to improve the security of wireless sensor network, the trust model of wireless sensor network based on cloud theory is established. The similarity comparison algorithm is introduced. Trust is expressed as a quantitative value. The new update fu...
ver más
|
|
|
|
|
|
|
|
|
|
|
Shuang Xu,Tong Zhou
Pág. pp. 151 - 164
In order to study the intelligent buildings, the intelligent building network security of wireless sensor was explored. Because of its advantages of low cost, easy installation, low maintenance and update cost, wireless sensor network system was applied ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Samuel Chapman, Richard Smith, Leandros Maglaras and Helge Janicke
-
|
|
|
|
|
|
|
|
|
|
|
Fahad M. Alotaibi and Vassilios G. Vassilakis
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand...
ver más
|
|
|
|
|
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
|
|
|
|
|
Yi Zhang, Lanxin Qiu, Yangzhou Xu, Xinjia Wang, Shengjie Wang, Agyemang Paul and Zhefu Wu
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial of Service (DDoS) attacks due to centralized control and flow-table constraints in network devices. To overcome this limitation, we introduce a multi-path routing alg...
ver más
|
|
|
|
|
|
|
|
|
|
|
Xianlong Dai, Guang Cheng, Ziyang Yu, Ruixing Zhu and Yali Yuan
The results of this paper can be used in the fields related to network measurement, especially in the fields of network traffic sampling, network traffic measurement, and finding top-k elephant flows.
|
|
|
|
|
|
|
|
|
|
|
Ricardo Severino, José Simão, Nuno Datia and António Serrador
Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attacker...
ver más
|
|
|
|
|
|
|
|
|
|
|
Seongmin Park, Byungsun Cho, Dowon Kim and Ilsun You
Research to deal with distributed denial of service (DDoS) attacks was kicked off from long ago and has seen technological advancement along with an extensive 5G footprint. Prior studies, and still newer ones, in the realm of DDoS attacks in the 5G envir...
ver más
|
|
|
|
|
|
|
|
|
|
|
Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra and Praveen Lalwani
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband...
ver más
|
|
|
|
|
|
|
|
|
|
|
Jie Xu and Wei Ding
Super points detection plays an important role in network research and application. With the increase of network scale, distributed super points detection has become a hot research topic. The key point of super points detection in a multi-node distribute...
ver más
|
|
|
|
|
|
|
|
|
|
|
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n...
ver más
|
|
|
|
|
|
|
|
|
|
|
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n...
ver más
|
|
|
|
|
|
|
|
|
|
|
Ramon Martín de Pozuelo, Agustín Zaballos, Joan Navarro and Guiomar Corral
The smart grid can be seen as a hybrid system composed by many systems. From a large scale point of view, it combines the electric power system itself and a heterogeneous information and communication technology (ICT) infrastructure. Additionally, these ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Ramon Martín de Pozuelo, Agustín Zaballos, Joan Navarro and Guiomar Corral
The smart grid can be seen as a hybrid system composed by many systems. From a large scale point of view, it combines the electric power system itself and a heterogeneous information and communication technology (ICT) infrastructure. Additionally, these ...
ver más
|
|
|
|
|
|
|
|
|
|
|
Tamim Al Mahmud
Pág. 18 - 26
Recent advancement and grown up technologies has enabled the development and implementation of low-cost, energy efficient and versatile sensor networks. Sensor networks are built up with sensors that have the ability to sense fiscal or environmental prop...
ver más
|
|
|
|
|
|