Showing 241 - 260 results of 319 for search '"IP address"', query time: 0.09s Refine Results
  1. 241

    Development and application of an environment monitoring system based on IPv6 by Xiuhong Li, Xuejie Hao, Lizeyan Yin, Yushuang Ma, Meiying Sun, Rongjin Yang

    Published 2022-09-01
    “…Abstract The widespread use of the Internet of Things (Iot) makes it possible to connect everything but having enough IP addresses is a fundamental requirement of this paradigm. …”
    Get full text
    Article
  2. 242

    Dynamic Server Selection by Using a Client Side Composite DNS-Metric by Dražen Tomić, Drago Žagar

    Published 2018-01-01
    “…The server selection is based on the calculations of a composite DNS-metric in which servers, whose IP addresses are sent in a DNS response, are ranked from the optimal to the least suitable. …”
    Get full text
    Article
  3. 243

    SISTEM MONITORING DENGAN MESSAGE MASTER MP1629-L PT. APLIKANUSA LINTASARTA JAKARTA SELATAN by , REVI SOFA RIFFANY, , Nur Rohman Rosyid, PhD.,Eng.

    Published 2013
    “…The result of this final project is Simonica is monitoring electricity supply, door status, temperature and air conditions by utilizing PT Aplikanusa Lintasartaâ��s networks with IP addresses that have been set in each device.…”
    Thesis
  4. 244

    FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET by Cemal Koçak, Buğra Alp Tosunoglu

    Published 2022-12-01
    “…A malicious node could penetrate into the IP addresses on a Flood Attack based User Datagram Protocol (UDP) to breakdown the data communication between two vehicles. …”
    Get full text
    Article
  5. 245

    A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection by Xuan Dau Hoang, Hong Ky Pham

    Published 2016-10-01
    “…This paper reviews methods to find the high-occurrence-frequency elements in the data stream and applies the most efficient methods to find Hot-IPs that are high-frequency IP addresses of IP packets passing through the network. …”
    Get full text
    Article
  6. 246

    P4-KBR: A Key-Based Routing System for P4-Programmable Networks by Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja

    Published 2021-06-01
    “…In this paper, we propose an in-network key-based routing protocol called P4-KBR, in which end-points (hosts, contents or services) are identified by virtual identifiers (keys) instead of IP addresses, and where P4 network elements are programmed to be able to route the packets adequately. …”
    Get full text
    Article
  7. 247

    COVID-19 Treatments Sold Online Without Prescription Requirements in the United States: Cross-sectional Study Evaluating Availability, Safety and Marketing of Medications by Sachiko Ozawa, Joanna Billings, Yujiao Sun, Sushan Yu, Benjamin Penley

    Published 2022-02-01
    “…Patient safety characteristics, marketing techniques, price, legitimacy, IP addresses, and COVID-19 mentions were recorded. …”
    Get full text
    Article
  8. 248

    Graphical Representation of UWF-ZeekData22 Using Memgraph by Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Dae Hyun Sung, Farooq Mahmud

    Published 2024-03-01
    “…Node classification is used to predict the connection between IP addresses and ports as a form of attack tactic or non-attack tactic in the MITRE framework, implemented using Memgraph’s graph neural networks. …”
    Get full text
    Article
  9. 249

    On the Adaptive Real-Time Detection of Fast-Propagating Network Worms by Jung, Jaeyeon, Milito, Rodolfo A., Paxson, Vern

    Published 2006
    “…In this sense, the detectors that weintroduce are truly adaptive.We then introduce RBS+TRW, an algorithm that combines fan-out rate (RBS)and probability of failure (TRW) of connections to new destinations.RBS+TRW provides a unified framework that at one end acts as a pure RBSand at the other end as pure TRW, and extends RBS's power in detectingworms that scan randomly selected IP addresses.…”
    Get full text
  10. 250

    Overview of future internet: named data networking by Hussaini, Muktar, Awang Nor, Shahrudin, Ahmad, Amran

    Published 2019
    “…It evolved to access data independent from its location, by replacing IP addresses with content named. This paper reviews the most popular Information Centric Networking approaches, called Named Data Networking which is a clean-slate Internet architecture proposed to replace IP with hierarchical named content that utilizes route aggregation to improve scalability and support mobility. …”
    Get full text
    Conference or Workshop Item
  11. 251
  12. 252

    Design of security scheme to prevent DNS cache poisoning attacks by Ng, Wei Lin

    Published 2017
    “…DNS is a protocol which translate domain names to IP addresses of which network devices use to communicate with each other. …”
    Get full text
    Final Year Project (FYP)
  13. 253

    Honeynet as a service deployment approach in enabling virtual crime scene investigation by Hasheminejad, Hamidreza

    Published 2015
    “…For the participated organizations, unused IP addresses are being used as IP addresses for the HaaS honeypots. …”
    Get full text
    Thesis
  14. 254

    DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks by Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D., Sithu D. Sudarsan

    Published 2023-03-01
    “…Domain Name System (DNS) plays a critical role in the Internet ecosystem, translating numerical IP addresses to memorable domain names and vice versa. …”
    Get full text
    Article
  15. 255

    An Information-Centric Semantic Data Collection Tree for Wireless Sensor Networks by Ngoc-Thanh Dinh, Younghan Kim

    Published 2020-10-01
    “…Current routing and addressing operations in WSNs are based on IP addresses, while data collection and data queries are normally information-centric. …”
    Get full text
    Article
  16. 256

    PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO) by , HARJONO, S.T., , Dr. Widyawan, S.T., M.Sc.

    Published 2012
    “…A number of attacks to Honeyd originated from several host with private IP addresses from the internal network. Almost all attacks from hosts with Windows XP operating system, and 96.81% of attacks aimed at port 445. …”
    Thesis
  17. 257

    Threat intelligence using machine learning packet dissection by Sowinski-Mydlarz, Viktor, Li, Jun, Ouazzane, Karim, Vassilev, Vassil

    Published 2021
    “…Categorical variables are the source and destination IP addresses, protocol used and packet info/flag. The use of filters allows ability to recognize any type of packet (e.g., SYN, ACK, FIN, RST). …”
    Get full text
    Article
  18. 258

    Magnets to Adversaries—An Analysis of the Attacks on Public Cloud Servers by Phani Lanka, Cihan Varol, Kirk Burns, Narasimha Shashidhar

    Published 2023-11-01
    “…This work illustrates that adversary activity is highly versatile in the public cloud environment, with an average of 700 new and unique IP addresses found attacking honeypot infrastructure daily. …”
    Get full text
    Article
  19. 259

    Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App by Asmara Afzal, Mehdi Hussain, Shahzad Saleem, M. Khuram Shahzad, Anthony T. S. Ho, Ki-Hyun Jung

    Published 2021-08-01
    “…Furthermore, a detailed analysis of the trace files can help to create a list of chat servers and IP addresses of involved parties in the events. As a result, the proposed strategy significantly facilitates extraction of the app’s behavior from encrypted network traffic which can then be used as supportive evidence for forensic investigation.…”
    Get full text
    Article
  20. 260

    BATCP: Bandwidth-Aggregation Transmission Control Protocol by Ismael Amezcua Valdovinos, Jesus Arturo Perez Diaz, Luis Javier Garcia Villalba, Tai-hoon Kim

    Published 2017-08-01
    “…BATCP allows the use of multiple TCP connections to accept multiple IP addresses from a multi-homed node, scheduling segments among them based on a scheduling algorithm. …”
    Get full text
    Article