Showing 21 - 40 results of 319 for search '"IP address"', query time: 0.08s Refine Results
  1. 21

    Design and Implementation of a Vlsm Simulator by Hussein Abdul-Razzaq Lafta, Ammar Osamah Hoori

    Published 2023-07-01
    Subjects: “…VLSM, IP Addressing, Subnetting, Maximize Addressing Efficiency.…”
    Get full text
    Article
  2. 22
  3. 23

    Implementasi Trunk Interkoneksi Multi Server menggunakan Singleboard Komputer by Alwalid Nouvatie, Martono Dwi Atmadja, Waluyo Waluyo

    Published 2021-06-01
    Subjects: “…server, voip, ip telephony, internet telephony, digital phone, ip address, pbx, codec, prefix…”
    Get full text
    Article
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28

    Investigation of protection of DNS servers from cache poisoning attacks by Liu, Haochen.

    Published 2012
    “…It performs the translation between domain name and real IP address. DNS cache poisoning attack change or insert records in the resolver caches so that a DNS query will return a fake IP address of the attacker’s domain instead of the real IP address. …”
    Get full text
    Final Year Project (FYP)
  9. 29

    Design and Implementation of Internet Protocol by Muayad Khalil Murtadha

    Published 2013-08-01
    “… Determining the geographic location of an Internet Protocol (IP) devices based on its IP addresses is a challenging matter because of wide network topologies and many protocols used to interconnect these devices. …”
    Get full text
    Article
  10. 30

    Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift by M. V. Carriegos, N. DeCastro-García, D. Escudero

    Published 2023-01-01
    “…All the experiments have been carried out with a well-known optimal set of features: the geolocation information of the IP address. However, the geolocation features of an IP address can change over time. …”
    Get full text
    Article
  11. 31

    Development of (VOIP) applications for mobile devices by Lee, Heng Leong.

    Published 2009
    “…SIP Registrar Server is used to store the user location. As the IP Address changes due to the changes of user location, the registrar server will be responsible for storing the user latest IP address. …”
    Get full text
    Final Year Project (FYP)
  12. 32

    Design security schemes to prevent DNS cache poisoning attacks by Chang, Liu

    Published 2014
    “…DNS cache poisoning attack is a frequently discovered vulnerability that changes or inserts records in the resolver caches so that a DNS query will return a fake IP address of the attacker’s server instead of the real IP address. …”
    Get full text
    Final Year Project (FYP)
  13. 33

    IMPLEMENTASI BAYESIAN BELIEF NETWORK UNTUK SISTEM MANAJEMEN KEAMANAN JARINGAN DI JURUSAN TEKNIK ELEKTRO DAN TEKNOLOGI INFORMASI FT UGM by , AYUNINGTYAS KUMALASARI, , Sri Suning Kusumawardani, S.T, M.T.

    Published 2014
    “…Threshold determined that an IP address is a threat positive that its generate ThreatPositive values above 0.6. …”
    Thesis
  14. 34

    Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis by Yonas Kibret, Wang Yong

    Published 2013-04-01
    “…The experiment result proves this architecture can claim for multiple IP address, filter uninteresting traffic and gives a realism response for attacker.…”
    Get full text
    Article
  15. 35

    Tor Hidden Services: A Systematic Literature Review by Diana L. Huete Trujillo, Antonio Ruiz-Martínez

    Published 2021-09-01
    “…Among them, we can mention that Tor can hide a user’s IP address when accessing to a service such as the Web, and it also supports Tor hidden services (THS) (now named onion services) as a mechanism to conceal the server’s IP address, used mainly to provide anonymity to websites. …”
    Get full text
    Article
  16. 36

    TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack by Agus Wijayanto, Imam Riadi, Yudi Prayudi

    Published 2023-03-01
    “…The information that was gathered, such as the IP address and MAC address of the attacker, the IP address and MAC address of the target, and the date and time of the attack are examples of evidence information that was gathered. …”
    Get full text
    Article
  17. 37

    Developing TCP/IP and UDP traffic monitoring tool / Rafiq Che Mat by Che Mat, Rafiq

    Published 2005
    “…For example, in the case of usage of file transfer, the TCP/IP and UDP Traffic monitor checks the details of the data transmission including the size of messages transmitted or received during a given period of time, the source IP address and MAC address, the destination IP address and MAC address, the source and destination port number, the type of protocol that have been used and etc. …”
    Get full text
    Student Project
  18. 38

    MTDCD:A Hybrid Defense Mechanism Against Network Intrusion by GAO Chun-gang, WANG Yong-jie, XIONG Xin-li

    Published 2022-07-01
    “…Both moving target defense and cyber deception defense protect their own systems and networks by increasing the uncertainty of information acquired by attackers.They can slow down network reconnaissance attacks to a certain extent.However,a single moving target defense technology cannot prevent attackers who use multiple information to conduct network intrusions.Meanwhile,the deployed decoy node may be identified and marked by the attacker,thereby reducing the defense effectiveness.Therefore,this paper proposes a hybrid defense mechanism combining moving target defense and cyber deception defens.Through in-depth analysis of actual network confrontation,a network intrusion threat model is constructed.Finally,a defense effectiveness evaluation model based on the Urn model is built.In addition,this paper evaluates the defense performance of the proposed hybrid defense method from multiple aspects such as virtual network topology size,deception probability of decoy nodes,IP address randomization period,IP address transfer probability,etc.,and provides reference and guidance for subsequent defense strategy design.…”
    Get full text
    Article
  19. 39

    Development of a software application for teaching computer networking by Chua, Benson Shi Yao

    Published 2021
    “…From an IP address, you can also identify the subnetwork that the device is in. …”
    Get full text
    Final Year Project (FYP)
  20. 40

    Mobile application development for CCTV system by Koh, Wei Ting

    Published 2015
    “…In this project, the main focus is on creating and test out a user platform for IP address CCTV system with Android base device. Software implementation used Eclipse Juno 4.2 wit Android Software Development Kit (SDK) and PHP file. …”
    Get full text
    Final Year Project (FYP)