-
61
Gridded Data of MAGSAT Crustal Magnetic Anomalies in the Antarctic Region
Published 1995-11-01“…These data sets were prepared under an anonymous ftp site of the workstation at the Center for Antarctic Environment Monitoring (CAEM) of the National Institute of Polar Research (TCP/IP address : 133.57.3.2), and made accessible to users.…”
Get full text
Article -
62
PELAPORAN KONDISI ROUTER MIKROTIK MELALUI SMS
Published 2013“…There are several events that cause disruptions in the router on an internet network including: connection failure, the IP address flooding with data, theft of confidential information, data mutilate assault, etc.. …”
Thesis -
63
Flow-models 2.0: Elephant flows modeling and detection with machine learning
Published 2023-12-01“…The improved features include flow skipping and counting, flow filtering, IP address anonymization, and time series data calculation. …”
Get full text
Article -
64
Study on security of IPv6 address management in enterprise WLAN
Published 2012“…Each time user try to access the network will be given different IP address to protect user privacy which will be generated using CFB mode of AES algorithm, however this dynamic address can be identified easily by the system…”
Get full text
Monograph -
65
Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack
Published 2022-01-01“…This provides anonymity because the attacker’s IP address seems to be that of the VPN rather than his own, masking the IP address. …”
Get full text
Article -
66
Header investigation for spam email forensics using framework of national institute of standards and technology
Published 2021-08-01“…The results of this study are expected to be able to find out the spam sender's email address, the spam email sender's IP address, and other information needed.…”
Get full text
Article -
67
360 degree vision based sensor network for multi-target tracking
Published 2010“…Image retrieval from the IP camera is coded using Java; the program automatically grabs and updates images from the IP address of the IP Camera. Matlab Programming is also utilized to unwarp the 360° image. …”
Get full text
Final Year Project (FYP) -
68
High reliability replication technique for web-server cluster systems
Published 2005“…In this paper, we propose a mapping mechanism model called enhanced domain name server (E-DNS) that dispatches the user requests through the URL-name to IP-address under Neighbor Replica Distribution Technique (NRDT) to improve the reliability of the system.…”
Get full text
Conference or Workshop Item -
69
Development of an advanced nano-satellite (VELOX-II) – ground station
Published 2015“…This objective for this experiment will allow a remote control of the input frequency from a computer with the same network ip address as the server’s ip address which will be beneficial to the ground station project. …”
Get full text
Final Year Project (FYP) -
70
Online VLSM IP calculator
Published 2010“…Before this student and staff in FCSSE has to calculate the IP address manually. It difficult for the staff and student to calculate the IP. …”
Get full text
Undergraduates Project Papers -
71
WEB PHISHING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD
Published 2019-02-01“…The success of the investigation can be found in the source of the attack in the form of IP Address, URL phishing, DNS protocol, IMAP, username, password, FTP, SMTP, and HTTP. …”
Get full text
Article -
72
Design and Implementation of Internet Protocol Based Geolocation System
Published 2013-06-01“… Determining the geographic location of an Internet Protocol (IP) devices based on its IP addresses is a challenging matter because of wide network topologies and many protocols used to interconnect these devices. …”
Get full text
Article -
73
Discovery of information from the Internet service providers (ISPs): the position under the law in Malaysia and the United Kingdom
Published 2014“…This method is also used by the parties to find out Internet Protocol (IP) address of the subscribers and their details from their Internet Service Providers (ISPs). …”
Get full text
Book Chapter -
74
Interworking between WiMAX and UMTS to provide seamless services
Published 2010“…This article represents an interworking architecture between Universal Mobile Telecommunications System (UMTS) and WiMAX where Third Generation Partnership Project (3GPP) IP Multimedia Subsystem (IMS) and Mobile IPv4 are applied together to maintain the continuity of an on-going session and for that to keep the Internet Protocol (IP) address to be static while the consumer having internet and data access is roaming in a heterogeneous networking environment of different Radio Access Technologies. …”
Article -
75
Perancangan Sistem Informasi Parkir dengan WiFi Berbasis Arduino
Published 2016-12-01“…the amount of available parking spots has been filled or empty. By accessing the IP address given earlier, then we will know the availability of parking space directly. …”
Get full text
Article -
76
Proposal and Prototype of DNS Server Firewall with Flexible Response Control Mechanism
Published 2019-12-01“…DNS is a system for distributed management and operation of domain names, and it is possible to associate with the resources such as IP address, instruct the destination host of the e-mail, and so on. …”
Get full text
Article -
77
Route Lookup Algorithms Using the Novel Idea of Coded Prefix Trees
Published 2012-12-01“…The main advantage of the proposed algorithms compared to Trie-based solutions is that the number of node accesses does not depend on IP address length in both search and update procedures. …”
Get full text
Article -
78
Improving bandwidth utilization by compressing small-payload traffic for vehicular networks
Published 2019-04-01“…Some solutions are proposed to forward packets by context identifier, instead of IP address, based on header compression and software-defined networking technology. …”
Get full text
Article -
79
Ultra low-power design techniques for content addressable memory (CAM)
Published 2012“…Content addressable memory (CAM) is an important component for high performance search operations, used in many applications such as pattern matching, database engines and networking IP address lookup. However, conventional CAM designs consume a large amount of power, thus preventing the implementation and usage of large density CAM in a single chip. …”
Get full text
Final Year Project (FYP) -
80
Development of Fastnet config application / Ahmad Harisan Muhamad
Published 2007“…This application will automatically sets the IP address, Subnet Mask, Default Gateway and DNS for NIC and also changes the Internet Explorer Proxy Setting accordingly to the applied profile.…”
Get full text
Student Project