Showing 61 - 80 results of 319 for search '"IP address"', query time: 0.09s Refine Results
  1. 61

    Gridded Data of MAGSAT Crustal Magnetic Anomalies in the Antarctic Region by Kazuo SHIBUYA, Yoshifumi NOGI, Jun TAKENAKA

    Published 1995-11-01
    “…These data sets were prepared under an anonymous ftp site of the workstation at the Center for Antarctic Environment Monitoring (CAEM) of the National Institute of Polar Research (TCP/IP address : 133.57.3.2), and made accessible to users.…”
    Get full text
    Article
  2. 62

    PELAPORAN KONDISI ROUTER MIKROTIK MELALUI SMS by , SANDIKO JAGAD NATA, , Ir. Budi Setiyanto, MT.

    Published 2013
    “…There are several events that cause disruptions in the router on an internet network including: connection failure, the IP address flooding with data, theft of confidential information, data mutilate assault, etc.. …”
    Thesis
  3. 63

    Flow-models 2.0: Elephant flows modeling and detection with machine learning by Piotr Jurkiewicz

    Published 2023-12-01
    “…The improved features include flow skipping and counting, flow filtering, IP address anonymization, and time series data calculation. …”
    Get full text
    Article
  4. 64

    Study on security of IPv6 address management in enterprise WLAN by Jarot, Sigit Puspito Wigati, Siddiqi, Mohammad Umar

    Published 2012
    “…Each time user try to access the network will be given different IP address to protect user privacy which will be generated using CFB mode of AES algorithm, however this dynamic address can be identified easily by the system…”
    Get full text
    Monograph
  5. 65

    Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack by Muhammad Usman Rana, Osama Ellahi, Masoom Alam, Julian L. Webber, Abolfazl Mehbodniya, Shawal Khan

    Published 2022-01-01
    “…This provides anonymity because the attacker’s IP address seems to be that of the VPN rather than his own, masking the IP address. …”
    Get full text
    Article
  6. 66

    Header investigation for spam email forensics using framework of national institute of standards and technology by Mustafa Mustafa, Imam Riadi, Rusydi Umar

    Published 2021-08-01
    “…The results of this study are expected to be able to find out the spam sender's email address, the spam email sender's IP address, and other information needed.…”
    Get full text
    Article
  7. 67

    360 degree vision based sensor network for multi-target tracking by Chan, Alvin Han Shen.

    Published 2010
    “…Image retrieval from the IP camera is coded using Java; the program automatically grabs and updates images from the IP address of the IP Camera. Matlab Programming is also utilized to unwarp the 360° image. …”
    Get full text
    Final Year Project (FYP)
  8. 68

    High reliability replication technique for web-server cluster systems by Deris, Mustafa Mat, Abawajy, J. H., Zarina, M., Mamat, R.

    Published 2005
    “…In this paper, we propose a mapping mechanism model called enhanced domain name server (E-DNS) that dispatches the user requests through the URL-name to IP-address under Neighbor Replica Distribution Technique (NRDT) to improve the reliability of the system.…”
    Get full text
    Conference or Workshop Item
  9. 69

    Development of an advanced nano-satellite (VELOX-II) – ground station by Toh, Wen Bin

    Published 2015
    “…This objective for this experiment will allow a remote control of the input frequency from a computer with the same network ip address as the server’s ip address which will be beneficial to the ground station project. …”
    Get full text
    Final Year Project (FYP)
  10. 70

    Online VLSM IP calculator by Mohd Azuwan, Efendy Mail

    Published 2010
    “…Before this student and staff in FCSSE has to calculate the IP address manually. It difficult for the staff and student to calculate the IP. …”
    Get full text
    Undergraduates Project Papers
  11. 71

    WEB PHISHING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD by Aseh Ginanjar, Nur Widiyasono, Rohmat Gunawan

    Published 2019-02-01
    “…The success of the investigation can be found in the source of the attack in the form of IP Address, URL phishing, DNS protocol, IMAP, username, password, FTP, SMTP, and HTTP. …”
    Get full text
    Article
  12. 72

    Design and Implementation of Internet Protocol Based Geolocation System by Muayad Khalil Murtadha

    Published 2013-06-01
    “… Determining the geographic location of an Internet Protocol (IP) devices based on its IP addresses is a challenging matter because of wide network topologies and many protocols used to interconnect these devices. …”
    Get full text
    Article
  13. 73

    Discovery of information from the Internet service providers (ISPs): the position under the law in Malaysia and the United Kingdom by Mohamed, Duryana

    Published 2014
    “…This method is also used by the parties to find out Internet Protocol (IP) address of the subscribers and their details from their Internet Service Providers (ISPs). …”
    Get full text
    Book Chapter
  14. 74

    Interworking between WiMAX and UMTS to provide seamless services by Khan, M.M.A., Ismail, M.F.B., Dimyati, Kaharudin

    Published 2010
    “…This article represents an interworking architecture between Universal Mobile Telecommunications System (UMTS) and WiMAX where Third Generation Partnership Project (3GPP) IP Multimedia Subsystem (IMS) and Mobile IPv4 are applied together to maintain the continuity of an on-going session and for that to keep the Internet Protocol (IP) address to be static while the consumer having internet and data access is roaming in a heterogeneous networking environment of different Radio Access Technologies. …”
    Article
  15. 75

    Perancangan Sistem Informasi Parkir dengan WiFi Berbasis Arduino by Novi Yulianto, Fahraini Bacharuddin

    Published 2016-12-01
    “…the amount of available parking spots has been filled or empty. By accessing the IP address given earlier, then we will know the availability of parking space directly. …”
    Get full text
    Article
  16. 76

    Proposal and Prototype of DNS Server Firewall with Flexible Response Control Mechanism by Hideo Masuda, Shun Segawa, Masayuki Mori

    Published 2019-12-01
    “…DNS is a system for distributed management and operation of domain names, and it is possible to associate with the resources such as IP address, instruct the destination host of the e-mail, and so on. …”
    Get full text
    Article
  17. 77

    Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees by Mohammad Behdadfar, Hossein Saidi, Masoud Reza Hashemi

    Published 2012-12-01
    “…The main advantage of the proposed algorithms compared to Trie-based solutions is that the number of node accesses does not depend on IP address length in both search and update procedures. …”
    Get full text
    Article
  18. 78

    Improving bandwidth utilization by compressing small-payload traffic for vehicular networks by Jianan Sun, Ping Dong, Yajuan Qin, Tao Zheng, Xiaoyun Yan, Yuyang Zhang

    Published 2019-04-01
    “…Some solutions are proposed to forward packets by context identifier, instead of IP address, based on header compression and software-defined networking technology. …”
    Get full text
    Article
  19. 79

    Ultra low-power design techniques for content addressable memory (CAM) by Li, Chun Yin.

    Published 2012
    “…Content addressable memory (CAM) is an important component for high performance search operations, used in many applications such as pattern matching, database engines and networking IP address lookup. However, conventional CAM designs consume a large amount of power, thus preventing the implementation and usage of large density CAM in a single chip. …”
    Get full text
    Final Year Project (FYP)
  20. 80

    Development of Fastnet config application / Ahmad Harisan Muhamad by Muhamad, Ahmad Harisan

    Published 2007
    “…This application will automatically sets the IP address, Subnet Mask, Default Gateway and DNS for NIC and also changes the Internet Explorer Proxy Setting accordingly to the applied profile.…”
    Get full text
    Student Project