Showing 101 - 120 results of 319 for search '"IP address"', query time: 0.09s Refine Results
  1. 101

    Wireless access control by Teck Ping, Lee

    Published 2005
    “…Wireless, a technology introduced to replace the wired connection is widely used in today's work and industiy segment.However,in wireless technology,user from outside are allowed to access the internet and private network in a wireless network area, as they are not authenticated.Here,The WachSpot system,a prototype developed to controlling the wireless user's access by using the login authentication technique and a small wireless hotspot architecture created for the implementation of the prototype.HTML and PHP programming languages have been chosen to design the system while Microsoft Access for storing the user data.A study has been conducted on types of access points,IP address and architecture that are suitable for WachSpot implementation.In order to make the development of system completed,planning has been prepared,the data collected, software and hardware requirements needed were analyzed to come out with the use case model and system architecture consist of user, access point and access server only.All interfaces have been generated by using the HTML and PHP while the implementation of system has been completed before the prototype is tested.The success of implementation and development of this project is expected to increase the security in wireless network by requiring the user to register a new account and login through the system to access the internet.…”
    Get full text
    Undergraduates Project Papers
  2. 102

    UMP library Wi-Fi access control system (ULWACS) by Flamino Doril, Zepher

    Published 2012
    “…The wireless technology was introduced to replace the wired connection and itis widely used in today’s work andindustry segment.Nowadays in wirelesstechnology,user from outside are allowed to access the internet a private network in awireless network area as they are not authenticated.This UMP LibraryWi-Fi Access Control System (ULWACS) is develop to program the authentication system and usage-based system that include program for registering and activating user, detect for overdue day and log off the connection between users and access point.The method for implement hotspot is Software Prototyping that includes execution and testing for each step.A study has been conducted on types of access points, IP address and architecture that are suitable for ULWACS implementation. …”
    Get full text
    Undergraduates Project Papers
  3. 103

    Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History by Ahmet Bucko, Kamer Vishi, Bujar Krasniqi, Blerim Rexha

    Published 2023-04-01
    “…The solution considers factors such as the number of password attempts, IP address consistency, and user agent type and assigns a weight or percentage to each. …”
    Get full text
    Article
  4. 104

    An intelligently distributed system for controlling information flows by Zhuzhgina Irina, Lazarev Alexey

    Published 2023-01-01
    “…The proposed approach uses deep learning models both for predicting IP address samples during initialization of a secure connection and for dynamic network traffic filtering in the DNS server. …”
    Get full text
    Article
  5. 105

    APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks by Wei Ren, Liangli Ma, Yi Ren

    Published 2013-06-01
    “…Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (PML) servers and the privacy of Electronic Product Codes (EPCs). …”
    Get full text
    Article
  6. 106

    A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system. by Zhaohan Li, June Li, Siyu Zhao, Xiong Chen, Ke Feng, Wang Wang

    Published 2022-01-01
    “…The consortium chain is used to store credentials required for authentication, ensuring that they are tamper-proof. We combine IP address, port number and physical ID, and propose the unique identification of IEDs, with a data structure designed for the identification. …”
    Get full text
    Article
  7. 107

    A Retrospective on Workload Identifiers: From Data Center to Cloud-Native Networks by Andrew Babakian, Pere Monclus, Robin Braun, Justin Lipman

    Published 2022-01-01
    “…The identifiers and locators type is defined by the isolation boundary and how the architecture considers semantic overload in the IP address. Each solution is an outcome of incrementalism, resulting in application delivery outgrowing the underlying network. …”
    Get full text
    Article
  8. 108

    Analisis Explotasi Keamanan Web Denial of Service Attack by Junita Juwita Siregar

    Published 2013-12-01
    “…Therefore, the attacker cannot overwhelm the network IP address and disrupt communication between a server and its client that may reject user’s request access to a system or a network service provided by a host.…”
    Get full text
    Article
  9. 109

    Geolocating tweets via spatial inspection of information inferred from tweet meta-fields by Motti Zohar

    Published 2021-12-01
    “…A given tweet can contain the geographic location of the transmitting device if the geolocation services are activated or the IP address can be geocoded, which is applicable to only 1–3% of all tweets. …”
    Get full text
    Article
  10. 110

    Remote control for Nao humanoid robot by Liu, Weide

    Published 2016
    “…For example, with the using of the Choregraphe (the software developed for Nao robot) to program and control the Nao robot directly, or we can use the IP address to connect the robot through the internet, or even we can use the web to control the robot. …”
    Get full text
    Final Year Project (FYP)
  11. 111

    SISTEM PEMBUKA PINTU RUMAH MENGGUNAKAN HANDPHONE BERBASIS ARDUINO UNO DENGAN FASILITAS WI-FI by , ANZAR FAUZI, , Drs.Abdul Rouf M.Ikom

    Published 2014
    “…To make access to the door of the only people who know the password and the IP address of the device that can lock and unlock it .…”
    Thesis
  12. 112

    A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall by A., Fairuzullah, Noraziah, Ahmad, Wan Maseri, Wan Mohd, Herawan, Tutut

    “…This paper is about the design and development to secure database access, a framework based on packet and content filtering on IP address, port and SQL statement. And simulate the framework and design database security framework. …”
    Get full text
    Conference or Workshop Item
  13. 113

    Water monitoring system design for data collection at specific intervals via cloud application by N. A., Abdul Muta’ali, Norazlianie, Sazali, S. A., Che Ghani, Walter, J.

    Published 2021
    “…A web server accessed through the local IP address serves the user interface that provides current data of the water parameters.…”
    Get full text
    Conference or Workshop Item
  14. 114

    An RNS-Based NDN Forwarding Plane: Design and Evaluation by Ruisi Wu, Wen-Kang Jia

    Published 2023-01-01
    “…Due to the variable length and uniqueness of names in NDN, traditional IP address-based routing and forwarding architecture is no longer suitable for NDN networks. …”
    Get full text
    Article
  15. 115

    Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology by Imam Riadi, Sunardi, Fitriyani Tella Nani

    Published 2022-05-01
    “…Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. …”
    Get full text
    Article
  16. 116

    Fine-Grained High-Utility Dynamic Fingerprinting Extraction for Network Traffic Analysis by Xueying Sun, Junkai Yi, Fei Yang, Lin Liu

    Published 2022-11-01
    “…By putting forward a fine-grained high-utility dynamic fingerprinting (Huf) algorithm to build a Huf-Tree based on the <i>N</i>-gram (every substring of a larger string, of a fixed length n) model, combining it with the network traffic segment-IP address transition (IAT) method to achieve dynamic application fingerprint extraction, and through the utility of fingerprint, the calculation was performed to obtain a more valuable fingerprint, to achieve fine-grained and efficient flow characteristic extraction, and to solve the problem of this method being highly dependent on manual analysis. …”
    Get full text
    Article
  17. 117

    Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns by Seungwoon Lee, Si Jung Kim, Jungtae Lee, Byeong-hee Roh

    Published 2020-09-01
    “…For network administrators to operate networks effectively and securely, it may be necessary to verify whether an assigned IP address is using NAT or not. In this paper, we propose a supervised learning-based active NAT device (NATD) identification using port response patterns. …”
    Get full text
    Article
  18. 118

    Efficient energy management system using Internet of things with FORDF technique for distribution system by Usha Rani Vinjamuri, Dr. B. Loveswara Rao

    Published 2021-02-01
    “…In the proposed system, each home device is interfaced with data acquisition module with IP address bringing about a huge work wireless network of devices. …”
    Get full text
    Article
  19. 119

    Using OpenSky Data for Teaching Software Engineering to Undergraduates by Kai Renz

    Published 2022-12-01
    “…Challenges in using the OpenSky-Online-API during hands-on sessions with groups of students could be found in the following areas: restrictions on the update frequency for data-retrieval calls when using the same IP address from the university network; necessity to create logins for accessing data for a specific timestamp; and a lack of student understanding of basic flight-data terminology, including geographic location. …”
    Get full text
    Article
  20. 120

    Rough Estimator Based Asynchronous Distributed Super Points Detection on High Speed Network Edge by Jie Xu, Wei Ding

    Published 2021-09-01
    “…In READ, each node scans IP address pairs asynchronously. When reaching the time window boundary, READ starts three-stage communication to detect the super point. …”
    Get full text
    Article