Showing 1 - 20 results of 20 for search '"IP address"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift by M. V. Carriegos, N. DeCastro-García, D. Escudero

    Published 2023-01-01
    “…All the experiments have been carried out with a well-known optimal set of features: the geolocation information of the IP address. However, the geolocation features of an IP address can change over time. …”
    Get full text
    Article
  3. 3

    IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks by Shahrukh Khalid, Athar Mahboob, Choudhry Fahad Azim, Aqeel Ur Rehman

    Published 2016-01-01
    “…The IP architecture has its known problem and issues even in infrastructure settings, like IP address overloading, mobility, multihoming, and so forth. …”
    Get full text
    Article
  4. 4

    COMPONENT FOR REMOTE DATA AVAILABILITY BASED ON THE ESP32 MICROCONTROLLER, A WIRELESS INTERFACE AND THE HTTP PROTOCOL by David Alejandro Chentes Ramos, Thaily Blanco Baro, Fidel Ernesto Hernández Montero

    Published 2025-02-01
    “…On this server, software written in Python manages information and user accounts, while a web server provides internet access to the software, and a DNS server masks the IP address and assigns a domain name. The developed system underwent extensive testing, including verification of remote management of sensed data, user account administration, and adaptation to different screen types. …”
    Get full text
    Article
  5. 5

    Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis by Tongguang Ni, Xiaoqing Gu, Hongyuan Wang, Yu Li

    Published 2013-01-01
    “…In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI). By approximating the adaptive autoregressive (AAR) model, the HRPI time series is transformed into a multidimensional vector series. …”
    Get full text
    Article
  6. 6

    Improving bandwidth utilization by compressing small-payload traffic for vehicular networks by Jianan Sun, Ping Dong, Yajuan Qin, Tao Zheng, Xiaoyun Yan, Yuyang Zhang

    Published 2019-04-01
    “…Some solutions are proposed to forward packets by context identifier, instead of IP address, based on header compression and software-defined networking technology. …”
    Get full text
    Article
  7. 7

    Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis by Du Tianqing

    Published 2025-01-01
    “…A common technique in the modern world, machine learning offers significant insights into locating the IP address and data origin. The focus of this paper is on how supervised machine learning is used to determine the data origin. …”
    Get full text
    Article
  8. 8

    Design and Implementation of Nanotechnology QCA Geometric Greedy Router by Lamjed Touil, Ismail Gassoumi, Abdellatif Mtibaa

    Published 2021-01-01
    “…This type of communication does not require an IP address. It uses only local information and can be used in many communication devices. …”
    Get full text
    Article
  9. 9

    Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks by Maher Ben Jemaa, Nahla Abid, Maryline Laurent-Maknavicius, Hakima Chaouchi

    Published 2009-01-01
    “…The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. …”
    Get full text
    Article
  10. 10

    APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks by Wei Ren, Liangli Ma, Yi Ren

    Published 2013-06-01
    “…Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (PML) servers and the privacy of Electronic Product Codes (EPCs). …”
    Get full text
    Article
  11. 11

    Polycast: A new paradigm for information-centric data delivery in heterogeneous mobile fog networks by Eun-Kyu Lee, Jae-Han Lim, Mario Gerla

    Published 2017-09-01
    “…This implies that a session may be broken if one of the peers is assigned a new IP address. To overcome this problem, this article proposes a novel structured late-binding address that makes use of node contexts to determine the logical destination group carried in the packet header. …”
    Get full text
    Article
  12. 12

    DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments by Min Su Song, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, Jong Hyuk Park

    Published 2014-01-01
    “…The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. …”
    Get full text
    Article
  13. 13

    Implementing regional blue economy research and innovation strategies: a case study for the Black Sea by Baris Salihoglu, Baris Salihoglu, Mustafa Yücel, Pinar Uygurer, Ezgi Şahin Yücel, Evangelos Papathanassiou, Devrim Tezcan, Adrian Stanica, Irina Stanciu, Snejana Petrova Moncheva, Nina Dzhembekova, Kremena Blagovestova Stefanova, Viktor Komorin, Tudor Castravet, Kakhaber Bilashvili, Valerian Melikidze, Mamuka Gvilava, Salome Kobaidze

    Published 2024-11-01
    “…The Black Sea SRIA and IP address the fundamental research challenges of the region, promote the blue economy, and also build vital support systems and innovative research infrastructure and capacity together with academia, funding organizations, industry, policy, civil society and local communities. …”
    Get full text
    Article
  14. 14

    Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication by Jung-oh Park, Sanggeun Kim

    Published 2015-01-01
    “…Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. …”
    Get full text
    Article
  15. 15

    Leaking Network Devices with Rubber Ducky Attack by Zeynep Rana Donmez, Şeyma Atmaca, Yıldıray YALMAN

    Published 2024-12-01
    “…By placing the module in a device connected to the target network, a network scan was performed to determine the security status, IP addresses, port information, and version information of all devices. …”
    Get full text
    Article
  16. 16

    Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy by Ming Hour Yang

    Published 2014-01-01
    “…Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. …”
    Get full text
    Article
  17. 17

    Combined dynamic multi-feature and rule-based behavior for accurate malware detection by Mohamed Belaoued, Abdelaziz Boukellal, Mohamed Amir Koalal, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan

    Published 2019-11-01
    “…We apply the proposed detection system on a combined set of three types of dynamic features, namely, (1) list of application programming interface calls; (2) application programming interface sequences; and (3) network traffic, which represents the IP addresses and domain names used by malware to connect to remote command-and-control servers. …”
    Get full text
    Article
  18. 18

    ProNDN: MCDM-Based Interest Forwarding and Cooperative Data Caching for Named Data Networking by Cong Pu

    Published 2021-01-01
    “…Named data networking (NDN), as a specific architecture design of information-centric networking (ICN), has quickly became a promising candidate for future Internet architecture, where communications are driven by data names instead of IP addresses. To realize the NDN communication paradigm in the future Internet, two important features, stateful forwarding and in-network caching, have been proposed to cope with drawbacks of host-based communication protocols. …”
    Get full text
    Article
  19. 19

    The Feasibility and Acceptability of an HIV Web- Based Screening Program in Iran by Roya Sahebi, Hossein Dehghanian, Alireza Mirahmadizadeh, Leyla Sahebi, Reza Yousefi Farkhad, Simin Khayatzadeh-Safaie, Nazila Sattari, Leila Jahangiry, Hamid Sharifi

    Published 2025-01-01
    “…Various strategies, including text messages, Instagram posts, and advertisements on local health center websites, were employed to promote website visitation.Results: The website received 11,581 visits from 4,303 unique Internet Protocol (IP) addresses. Of these, 3,079 visitors (71.0%) accessed the questionnaire section, and 456 (14.8%) completed the questionnaire. …”
    Get full text
    Article
  20. 20

    Pengujian Rule-Based pada Dataset Log Server Menggunakan Support Vector Machine Berbasis Linear Discriminat Analysis untuk Deteksi Malicious Activity by Kurnia Adi Cahyanto, Muhammad Anis Al Hilmi, Muhamad Mustamiin

    Published 2022-02-01
    “…From these logs, there are detailed data about IP addresses, client devices and sources, user requests, server responses, and other information. …”
    Get full text
    Article