-
101
Wireless access control
Published 2005“…Wireless, a technology introduced to replace the wired connection is widely used in today's work and industiy segment.However,in wireless technology,user from outside are allowed to access the internet and private network in a wireless network area, as they are not authenticated.Here,The WachSpot system,a prototype developed to controlling the wireless user's access by using the login authentication technique and a small wireless hotspot architecture created for the implementation of the prototype.HTML and PHP programming languages have been chosen to design the system while Microsoft Access for storing the user data.A study has been conducted on types of access points,IP address and architecture that are suitable for WachSpot implementation.In order to make the development of system completed,planning has been prepared,the data collected, software and hardware requirements needed were analyzed to come out with the use case model and system architecture consist of user, access point and access server only.All interfaces have been generated by using the HTML and PHP while the implementation of system has been completed before the prototype is tested.The success of implementation and development of this project is expected to increase the security in wireless network by requiring the user to register a new account and login through the system to access the internet.…”
Get full text
Undergraduates Project Papers -
102
UMP library Wi-Fi access control system (ULWACS)
Published 2012“…The wireless technology was introduced to replace the wired connection and itis widely used in today’s work andindustry segment.Nowadays in wirelesstechnology,user from outside are allowed to access the internet a private network in awireless network area as they are not authenticated.This UMP LibraryWi-Fi Access Control System (ULWACS) is develop to program the authentication system and usage-based system that include program for registering and activating user, detect for overdue day and log off the connection between users and access point.The method for implement hotspot is Software Prototyping that includes execution and testing for each step.A study has been conducted on types of access points, IP address and architecture that are suitable for ULWACS implementation. …”
Get full text
Undergraduates Project Papers -
103
Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History
Published 2023-04-01“…The solution considers factors such as the number of password attempts, IP address consistency, and user agent type and assigns a weight or percentage to each. …”
Get full text
Article -
104
An intelligently distributed system for controlling information flows
Published 2023-01-01“…The proposed approach uses deep learning models both for predicting IP address samples during initialization of a secure connection and for dynamic network traffic filtering in the DNS server. …”
Get full text
Article -
105
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
Published 2013-06-01“…Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (PML) servers and the privacy of Electronic Product Codes (EPCs). …”
Get full text
Article -
106
A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system.
Published 2022-01-01“…The consortium chain is used to store credentials required for authentication, ensuring that they are tamper-proof. We combine IP address, port number and physical ID, and propose the unique identification of IEDs, with a data structure designed for the identification. …”
Get full text
Article -
107
A Retrospective on Workload Identifiers: From Data Center to Cloud-Native Networks
Published 2022-01-01“…The identifiers and locators type is defined by the isolation boundary and how the architecture considers semantic overload in the IP address. Each solution is an outcome of incrementalism, resulting in application delivery outgrowing the underlying network. …”
Get full text
Article -
108
Analisis Explotasi Keamanan Web Denial of Service Attack
Published 2013-12-01“…Therefore, the attacker cannot overwhelm the network IP address and disrupt communication between a server and its client that may reject user’s request access to a system or a network service provided by a host.…”
Get full text
Article -
109
Geolocating tweets via spatial inspection of information inferred from tweet meta-fields
Published 2021-12-01“…A given tweet can contain the geographic location of the transmitting device if the geolocation services are activated or the IP address can be geocoded, which is applicable to only 1–3% of all tweets. …”
Get full text
Article -
110
Remote control for Nao humanoid robot
Published 2016“…For example, with the using of the Choregraphe (the software developed for Nao robot) to program and control the Nao robot directly, or we can use the IP address to connect the robot through the internet, or even we can use the web to control the robot. …”
Get full text
Final Year Project (FYP) -
111
SISTEM PEMBUKA PINTU RUMAH MENGGUNAKAN HANDPHONE BERBASIS ARDUINO UNO DENGAN FASILITAS WI-FI
Published 2014“…To make access to the door of the only people who know the password and the IP address of the device that can lock and unlock it .…”
Thesis -
112
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
Get full text
Conference or Workshop Item -
113
Water monitoring system design for data collection at specific intervals via cloud application
Published 2021“…A web server accessed through the local IP address serves the user interface that provides current data of the water parameters.…”
Get full text
Conference or Workshop Item -
114
An RNS-Based NDN Forwarding Plane: Design and Evaluation
Published 2023-01-01“…Due to the variable length and uniqueness of names in NDN, traditional IP address-based routing and forwarding architecture is no longer suitable for NDN networks. …”
Get full text
Article -
115
Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
Published 2022-05-01“…Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. …”
Get full text
Article -
116
Fine-Grained High-Utility Dynamic Fingerprinting Extraction for Network Traffic Analysis
Published 2022-11-01“…By putting forward a fine-grained high-utility dynamic fingerprinting (Huf) algorithm to build a Huf-Tree based on the <i>N</i>-gram (every substring of a larger string, of a fixed length n) model, combining it with the network traffic segment-IP address transition (IAT) method to achieve dynamic application fingerprint extraction, and through the utility of fingerprint, the calculation was performed to obtain a more valuable fingerprint, to achieve fine-grained and efficient flow characteristic extraction, and to solve the problem of this method being highly dependent on manual analysis. …”
Get full text
Article -
117
Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns
Published 2020-09-01“…For network administrators to operate networks effectively and securely, it may be necessary to verify whether an assigned IP address is using NAT or not. In this paper, we propose a supervised learning-based active NAT device (NATD) identification using port response patterns. …”
Get full text
Article -
118
Efficient energy management system using Internet of things with FORDF technique for distribution system
Published 2021-02-01“…In the proposed system, each home device is interfaced with data acquisition module with IP address bringing about a huge work wireless network of devices. …”
Get full text
Article -
119
Using OpenSky Data for Teaching Software Engineering to Undergraduates
Published 2022-12-01“…Challenges in using the OpenSky-Online-API during hands-on sessions with groups of students could be found in the following areas: restrictions on the update frequency for data-retrieval calls when using the same IP address from the university network; necessity to create logins for accessing data for a specific timestamp; and a lack of student understanding of basic flight-data terminology, including geographic location. …”
Get full text
Article -
120
Rough Estimator Based Asynchronous Distributed Super Points Detection on High Speed Network Edge
Published 2021-09-01“…In READ, each node scans IP address pairs asynchronously. When reaching the time window boundary, READ starts three-stage communication to detect the super point. …”
Get full text
Article