Showing 181 - 200 results of 319 for search '"IP address"', query time: 0.10s Refine Results
  1. 181

    An Anomaly Mitigation Framework for IoT Using Fog Computing by Muhammad Aminu Lawal, Riaz Ahmed Shaikh, Syed Raheel Hassan

    Published 2020-09-01
    “…The signature-based module utilizes a database of attack sources (blacklisted IP addresses) to ensure faster detection when attacks are executed from the blacklisted IP address, while the anomaly-based module uses an extreme gradient boosting algorithm for accurate classification of network traffic flow into normal or abnormal. …”
    Get full text
    Article
  2. 182

    ANALISIS DAN IMPLEMENTASI MIKROTIK ROUTER BOARD RB450G UNTUK MANAJEMEN JARINGAN (STUDI KASUS : BADAN PENGKAJIAN DAN PENERAPAN TEKNOLOGI SUB BALAI BESAR TEKNOLOGI ENERGI (B2TE-BPPT)... by Rahmat Rizkiyanto

    Published 2015-09-01
    “…Then, for security, made ​​the policy in terms of access to the IP address and port. In terms of permissions, can be applied to the scheduling of access to certain sites. …”
    Get full text
    Article
  3. 183

    <italic>Dark-TRACER</italic>: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns by Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue

    Published 2022-01-01
    “…The darknet, an unused IP address space, is relatively conducive to observing and analyzing indiscriminate cyberattacks because of the absence of legitimate communication. …”
    Get full text
    Article
  4. 184

    Delicar: A Smart Deep Learning Based Self Driving Product Delivery Car in Perspective of Bangladesh by Md. Kalim Amzad Chy, Abdul Kadar Muhammad Masum, Kazi Abdullah Mohammad Sayeed, Md Zia Uddin

    Published 2021-12-01
    “…Geoip2 (a python library) retrieves the longitude and latitude from the equipped system’s IP address to report the live geographical position to the authorities. …”
    Get full text
    Article
  5. 185

    Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro by Dyakso Anindito Nugroho, Adian Fatchur Rochim, Eko Didik Widianto

    Published 2015-04-01
    “…The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. …”
    Get full text
    Article
  6. 186

    SDN-Enabled FiWi-IoT Smart Environment Network Traffic Classification Using Supervised ML Models by Elaiyasuriyan Ganesan, I-Shyan Hwang, Andrew Tanny Liem, Mohammad Syuhaimi Ab-Rahman

    Published 2021-06-01
    “…We capture the different IoT and non-IoT device network traffic trace files based on the traffic flow and analyze the traffic traces to extract statistical attributes (port source and destination, IP address, etc.). We develop a robust IoT device classification process module framework, using these network-level attributes to classify IoT and non-IoT devices. …”
    Get full text
    Article
  7. 187

    QPSK communication between two nodes using USRP by Ng, Eric Jia Qiang

    Published 2017
    “…By assigning the fixed IP address to the device itself, the Windows PC will be able to detect the USRP X310. …”
    Get full text
    Final Year Project (FYP)
  8. 188

    SISTEM KOMUNIKASI TELEMEDIS BERBASIS JARINGAN PEER TO PEER by , Satyo Nuriadi, , Ir. Lukito Edi Nugroho, M.Sc., Ph.D

    Published 2012
    “…Difficulty to access IP address in telemedicine can be handled by add virtua dedicated lines e.g. …”
    Thesis
  9. 189

    High performance web servers using load balancing technique / Siti Aishah Ab Rahman by Ab Rahman, Siti Aishah

    Published 2006
    “…The Round Robin method that will be use in this project is dispatcher-based load balancing cluster where the parallel services of servers can appear as a virtual service on a single IP address. For routing, Network Address Translation is a technique in which the source or destination addresses of IP packets are rewritten as they pass through a router or firewall.…”
    Get full text
    Student Project
  10. 190

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…There is no easy way to this approach because attacker can spoof the source IP address easily. Traceback models try to locate source of attack regardless of whether the source address field in each packet contains false information or not. …”
    Get full text
    Thesis
  11. 191

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…This system works by creating alerts built from an engine that reads the parameters in the attacker's IP address. Webmin is used to simplify rule management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 192

    A Dual-Connectivity Mobility Link Service for Producer Mobility in the Named Data Networking by Ju-Ho Choi, Jung-Hwan Cha, Youn-Hee Han, Sung-Gi Min

    Published 2020-08-01
    “…Named Data Networking (NDN), which could request data by content name rather than location (IP address), is suitable for such mobile IoT environments. …”
    Get full text
    Article
  13. 193

    Analisa QoS Pada Penerapan Local IPTV Dalam Jaringan IEEE 802.11 by Sri Hartanto

    Published 2020-05-01
    “…IPTV merupakan protokol aplikasi TCP/IP yang menggunakan pengalamatan internet (IP Address) dalam suatu jaringan telekomunikasi untuk pengiriman konten multimedia berbentuk audio video, yaitu berupa layanan siaran televisi digital. …”
    Get full text
    Article
  14. 194

    Ubiquitous Control of a CNC Machine: Proof of Concept for Industrial IoT Applications by Stefan A. Aebersold, Mobayode O. Akinsolu, Shafiul Monir, Martyn L. Jones

    Published 2021-12-01
    “…To avert potential cyber attacks or threats to a reasonable extent and to guarantee the security of the PoC, a multi-factor authentication (MFA) including an administrative password and an IP address is implemented to control the access to the web-based ubiquitous HMI proffered by the PoC.…”
    Get full text
    Article
  15. 195

    Content Management Based on Content Popularity Ranking in Information-Centric Networks by Nazib Abdun Nasir, Seong-Ho Jeong

    Published 2021-06-01
    “…Although the host-based Internet has been serving its users for a long time, managing network resources efficiently during high traffic load is problematic for the host-based Internet because locating the host with their IP address is one of the primary mechanisms behind this architecture. …”
    Get full text
    Article
  16. 196

    Cross channel fraud detection framework in financial services using recurrent neural networks by Patel, Yogesh

    Published 2019
    “…Firstly, the study focuses on Feature Engineering where along raw attributes such as IP Address, Amount and other, two novel features for remote banking fraud are evaluated, i.e., the time spend on a page and the time between page transition. …”
    Get full text
    Thesis
  17. 197

    Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness by Abdul Razak, Muhammad Thariq

    Published 2020
    “…From the analysis of the result, various types of information for forensic investigation were acquired, such as type of outdoor activity, activity timestamp, client IP address and date accessed. In the final phase, the M-Health Digital Evidence Taxonomy System (MDETS) was developed as a proof of concept to demonstrate the integration of digital evidence taxonomy with the knowledge-sharing approach to facilitate digital forensic readiness. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 198

    An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic by Ahmed Khalaf, Bashar

    Published 2019
    “…The agent is equipped with three analysis functions that operate on three parameters of normal traffic intensity, traffic attack behavior, and IP address history log. The agent accordingly reacts on each of these attacks with different types of filtering actions as required. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 199

    Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness by Abdul Razak, Muhammad Thariq

    Published 2020
    “…From the analysis of the result, various types of information for forensic investigation were acquired, such as type of outdoor activity, activity timestamp, client IP address and date accessed. In the final phase, the M-Health Digital Evidence Taxonomy System (MDETS) was developed as a proof of concept to demonstrate the integration of digital evidence taxonomy with the knowledge-sharing approach to facilitate digital forensic readiness. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 200

    An adaptive protection of flooding attacks model for complex network environments by Ahmad Khalaf, Bashar, Mostafa, Salama A., Mustapha, Aida, Mohammed, Mazin Abed, Mahmoud, Moamin A., Al-Rimy, Bander Ali Saleh, Abd. Razak, Shukor, Elhoseny, Mohamed, Marks, Adam

    Published 2021
    “…There are three parameters on which the agent relies, normal traffic intensity, traffic attack behavior, and IP address history log, to decide on the operation of two traffic filters. …”
    Get full text
    Article