-
1
-
2
Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift
Published 2023-01-01“…All the experiments have been carried out with a well-known optimal set of features: the geolocation information of the IP address. However, the geolocation features of an IP address can change over time. …”
Get full text
Article -
3
IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks
Published 2016-01-01“…The IP architecture has its known problem and issues even in infrastructure settings, like IP address overloading, mobility, multihoming, and so forth. …”
Get full text
Article -
4
COMPONENT FOR REMOTE DATA AVAILABILITY BASED ON THE ESP32 MICROCONTROLLER, A WIRELESS INTERFACE AND THE HTTP PROTOCOL
Published 2025-02-01“…On this server, software written in Python manages information and user accounts, while a web server provides internet access to the software, and a DNS server masks the IP address and assigns a domain name. The developed system underwent extensive testing, including verification of remote management of sensed data, user account administration, and adaptation to different screen types. …”
Get full text
Article -
5
Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis
Published 2013-01-01“…In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI). By approximating the adaptive autoregressive (AAR) model, the HRPI time series is transformed into a multidimensional vector series. …”
Get full text
Article -
6
Improving bandwidth utilization by compressing small-payload traffic for vehicular networks
Published 2019-04-01“…Some solutions are proposed to forward packets by context identifier, instead of IP address, based on header compression and software-defined networking technology. …”
Get full text
Article -
7
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…A common technique in the modern world, machine learning offers significant insights into locating the IP address and data origin. The focus of this paper is on how supervised machine learning is used to determine the data origin. …”
Get full text
Article -
8
Design and Implementation of Nanotechnology QCA Geometric Greedy Router
Published 2021-01-01“…This type of communication does not require an IP address. It uses only local information and can be used in many communication devices. …”
Get full text
Article -
9
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks
Published 2009-01-01“…The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. …”
Get full text
Article -
10
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
Published 2013-06-01“…Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (PML) servers and the privacy of Electronic Product Codes (EPCs). …”
Get full text
Article -
11
Polycast: A new paradigm for information-centric data delivery in heterogeneous mobile fog networks
Published 2017-09-01“…This implies that a session may be broken if one of the peers is assigned a new IP address. To overcome this problem, this article proposes a novel structured late-binding address that makes use of node contexts to determine the logical destination group carried in the packet header. …”
Get full text
Article -
12
DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
Published 2014-01-01“…The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. …”
Get full text
Article -
13
Implementing regional blue economy research and innovation strategies: a case study for the Black Sea
Published 2024-11-01“…The Black Sea SRIA and IP address the fundamental research challenges of the region, promote the blue economy, and also build vital support systems and innovative research infrastructure and capacity together with academia, funding organizations, industry, policy, civil society and local communities. …”
Get full text
Article -
14
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Published 2015-01-01“…Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. …”
Get full text
Article -
15
Leaking Network Devices with Rubber Ducky Attack
Published 2024-12-01“…By placing the module in a device connected to the target network, a network scan was performed to determine the security status, IP addresses, port information, and version information of all devices. …”
Get full text
Article -
16
Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy
Published 2014-01-01“…Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. …”
Get full text
Article -
17
Combined dynamic multi-feature and rule-based behavior for accurate malware detection
Published 2019-11-01“…We apply the proposed detection system on a combined set of three types of dynamic features, namely, (1) list of application programming interface calls; (2) application programming interface sequences; and (3) network traffic, which represents the IP addresses and domain names used by malware to connect to remote command-and-control servers. …”
Get full text
Article -
18
ProNDN: MCDM-Based Interest Forwarding and Cooperative Data Caching for Named Data Networking
Published 2021-01-01“…Named data networking (NDN), as a specific architecture design of information-centric networking (ICN), has quickly became a promising candidate for future Internet architecture, where communications are driven by data names instead of IP addresses. To realize the NDN communication paradigm in the future Internet, two important features, stateful forwarding and in-network caching, have been proposed to cope with drawbacks of host-based communication protocols. …”
Get full text
Article -
19
The Feasibility and Acceptability of an HIV Web- Based Screening Program in Iran
Published 2025-01-01“…Various strategies, including text messages, Instagram posts, and advertisements on local health center websites, were employed to promote website visitation.Results: The website received 11,581 visits from 4,303 unique Internet Protocol (IP) addresses. Of these, 3,079 visitors (71.0%) accessed the questionnaire section, and 456 (14.8%) completed the questionnaire. …”
Get full text
Article -
20
Pengujian Rule-Based pada Dataset Log Server Menggunakan Support Vector Machine Berbasis Linear Discriminat Analysis untuk Deteksi Malicious Activity
Published 2022-02-01“…From these logs, there are detailed data about IP addresses, client devices and sources, user requests, server responses, and other information. …”
Get full text
Article