Showing 261 - 280 results of 319 for search '"IP address"', query time: 0.10s Refine Results
  1. 261

    Anteater: Advanced Persistent Threat Detection With Program Network Traffic Behavior by Yangzong Zhang, Wenjian Liu, Kaiian Kuok, Ngai Cheong

    Published 2024-01-01
    “…By scrutinizing a program’s network traffic configuration, Anteater efficiently pinpoints and intercepts the IP addresses associated with abnormal program access. …”
    Get full text
    Article
  2. 262
  3. 263

    Combined dynamic multi-feature and rule-based behavior for accurate malware detection by Mohamed Belaoued, Abdelaziz Boukellal, Mohamed Amir Koalal, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan

    Published 2019-11-01
    “…We apply the proposed detection system on a combined set of three types of dynamic features, namely, (1) list of application programming interface calls; (2) application programming interface sequences; and (3) network traffic, which represents the IP addresses and domain names used by malware to connect to remote command-and-control servers. …”
    Get full text
    Article
  4. 264

    Who owns Internet of Thing devices? by Yuxuan Jia, Bing Han, Qiang Li, Hong Li, Limin Sun

    Published 2018-11-01
    “…In particular, IoT devices in the cyberspace are reachable and visible through IP addresses. This article uniquely exploits to qualify the distribution of owner information of IoT devices based on the observation; consumers may write relevant details into the application-layer service on the IoT devices, such as company or usernames. …”
    Get full text
    Article
  5. 265

    A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment by Mikail Mohammed Salim, Alowonou Kowovi Comivi, Tojimurotov Nurbek, Heejae Park, Jong Hyuk Park

    Published 2022-08-01
    “…A Digital Twin (DT) is designed for a group of devices on the edge layer to collect device data and inspect packet headers using Deep Learning for connections with external unique IP addresses with open connections. Data are synchronized between the DT and a Packet Auditor (PA) for detecting corrupt device data transmission. …”
    Get full text
    Article
  6. 266

    Internet filters and academic freedom : librarian and stakeholder perceptions and their impact on access to information by Orenstein, David I., Stoll-Ron, Lisa

    Published 2021
    “…Filtering software is used in libraries to block Web-based content; this includes parts or all of certain websites, ranges of IP addresses, as well as key word level sifting of search results that delete or do not return all possible and alternative content. …”
    Get full text
    Journal Article
  7. 267

    Effective Flow Table Space Management Using Policy-Based Routing Approach in Hybrid SDN Network by Manish Paliwal, Kapil Kumar Nagwanshi

    Published 2022-01-01
    “…The network architecture employs a policy-based routing algorithm that takes advantage of free IP addresses from the free IP pool. The technique enables efficient use of available flow table space, which is critical in SDN architecture due to the small flow table size. …”
    Get full text
    Article
  8. 268

    Phenomenon of Webometrics Activity of Regional Libraries in Ukraine by Strungar Artur

    Published 2019-01-01
    “…The main indicators of the quality of the web resource are defined: Alexa Rank, which reflects popularity on the Internet by visiting the pages of the site with unique IP addresses of users. The following indicators are also defined as additional important characteristics: domain rating, domain page rating, ranking of the site by the number of organic words on the first ten pages of search engines and total organic traffic to the site on key requests. …”
    Get full text
    Article
  9. 269
  10. 270

    Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds by Kandula, Srikanth, Katabi, Dina, Jacob, Matthias, Berger, Arthur

    Published 2005
    “…First,instead of authenticating clients based on whether theysolve the graphical test, Kill-Bots uses the test to quicklyidentify the IP addresses of the attack machines. Thisallows it to block the malicious requests while allowingaccess to legitimate users who are unable or unwillingto solve graphical tests. …”
    Get full text
  11. 271

    Outreach-focused enterprise network design I by Soh, Yong Kiat

    Published 2024
    “…The outreach program is meticulously structured to cover crucial topics such as Internet Protocol (IP) addressing, Switchport Security, Virtual Local Area Networks (VLANs), Routing Protocols, Access Control Lists (ACLs) and the utilization of Cisco Packet Tracer simulation software for practical, hands-on learning experiences. …”
    Get full text
    Final Year Project (FYP)
  12. 272

    Automated network profile switcher (ANPROS) / Mohd Zairulhisyam Zakaria by Zakaria, Mohd Zairulhisyam

    Published 2007
    “…Network profile contains the configuration setting of network such as IP addresses on local area network. Usually there will be more than one network profile stored in a notebook of mobile user such as home, office or campus networks. …”
    Get full text
    Thesis
  13. 273

    Privacy-Preserving Passive DNS by Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, Sokratis Katsikas

    Published 2020-08-01
    “…The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. …”
    Get full text
    Article
  14. 274

    Assessing the Security of Campus Networks: The Case of Seven Universities by Rui Zheng, Hao Ma, Qiuyun Wang, Jianming Fu, Zhengwei Jiang

    Published 2021-01-01
    “…Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. …”
    Get full text
    Article
  15. 275

    A dynamic network traffic classifier using supervised ML for a Docker-based SDN network by Pritom Kumar Mondal, Lizeth P. Aguirre Sanchez, Emmanuele Benedetto, Yao Shen, Minyi Guo

    Published 2021-07-01
    “…ML offers good performance to real-time traffic solutions without depending on well-known TCP or UDP port numbers, IP addresses, or encrypted payloads. In this paper, using three ML techniques, we first classify network flows with 3, 5, and 7 parameters giving up to 97.14% accuracy. …”
    Get full text
    Article
  16. 276

    Design and testing of an experimental IPv4-to-IPv6 transition network / Mustaffa Samad by Samad, Mustaffa

    Published 2006
    “…This has lead to the depletion of new Internet Protocol (IP) addresses worldwide. To overcome this predicament, the new Internet Protocol version 6 (IPv6) had been introduced. …”
    Get full text
    Article
  17. 277

    An access control for KUKTEM wired LAN AC spot by Ramalingan, Sivaganasan

    Published 2006
    “…Since all users gain access to internet through KUKTEM Wired LAN, due to this the speed of internet connection decreased and network become traffic.So to overcome this kind of problem, the system needs to change to more sophisticated and secure system.Thus,this Wired LAN System (AC-Spot) was developed specifically for KUKTEM users.This system not only control access the internet by users but it become helpful to administrator leT of KUKTEM in order to identify the person,time and IP Addresses of the users who browsing the internet.This Wired LAN System is easy to use because the architecture of the system is user-friendly.This system proved that,it is more efficitmt and secure compare to existing system.Application of this system developed by using PHP(Hypertext Preprocessor),JavaScript,HTML(Hypertext Markup Language)and Microsoft Office Access Generally hoped that,this system become more secure and efficient in KUKTEM internet networks compare to current existing system.…”
    Get full text
    Undergraduates Project Papers
  18. 278

    On Improving the Accuracy of Internet Infrastructure Mapping by Paul Mccherry, Vasileios Giotsas, David Hutchison

    Published 2023-01-01
    “…As a byproduct of our new method reported in this paper, we create a validation dataset that maps hundreds of IP addresses to geo-coordinate landmarks or vantage points, which is highly desirable for IP geolocation research. …”
    Get full text
    Article
  19. 279
  20. 280