-
141
Innovative Knowledge Management Collaboration Through Internet of Things
Published 2015“…The IOT devices and system are integrated with internet using cellular, WIFI, 3G module, Wimax and each device is assigned a unique IP address which uses IPv6 address space. The benefit of these devices is that they work under low power and low bandwidth which make them special innovation. …”
Get full text
Conference or Workshop Item -
142
DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology
Published 2022-09-01“…Second, we suggest tracing and recording the IP address of malicious devices inside the blockchain to prevent them from connecting and communicating with the IoT networks. …”
Get full text
Article -
143
Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast Encryption
Published 2020-06-01“…The experimental result shows that our CSD saves the header size by 17% on average and more than 1000 times when assuming a specific IoT example of IP address with 20 wildcards and <inline-formula> <math display="inline"> <semantics> <msup> <mn>2</mn> <mn>20</mn> </msup> </semantics> </math> </inline-formula> total users, compared to the SD-based broadcast encryption. …”
Get full text
Article -
144
A survey of methods for encrypted network traffic fingerprinting
Published 2023-01-01“…They are expected to be less effective because cloud-based and software-defined networks have ambiguous boundaries, and network configurations not dependent on existing IP address schemes increase. Herein, we investigate and analyze the Transport Layer Security (TLS) fingerprinting technique, a technology that can analyze and classify encrypted traffic without decryption while addressing the problems of existing network fingerprinting techniques. …”
Get full text
Article -
145
IDENTIFICATION AND INDIVIDUALIZATION OF A NATURAL PERSON IN THE INTERNET COMPUTER NETWORK: LEGAL ASPECTS
Published 2022-12-01“…The means of identification of an individual on the Internet may be his/her name, nickname, image, URL of a web page, domain name, IP address, e-mail address, etc. The range of means of individualization of an individual on the Internet is not exhaustive.…”
Get full text
Article -
146
Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System
Published 2021-02-01“…The security system was build by configuring the IP address and network system devices (server, remote admin, client attacker). …”
Get full text
Article -
147
Fast Conflict Detection for Multi-Dimensional Packet Filters
Published 2022-08-01“…In recent years, many conflict detection algorithms have been proposed, but most of them detect conflicts for only prefix fields (i.e., source/destination IP address fields) of filters. For greater practicality, conflict detection must include non-prefix fields such as source/destination IP port fields and the protocol field. …”
Get full text
Article -
148
IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes
Published 2022-11-01“…Results from this study show that the proposed model has an average of 21.1% more resistance to a growing number of adversaries than the benchmark models, thus revealing that the model is better suited for the security of IoT address management servers in smart homes, thereby enhancing resilience against related threats and the success of IP address management.…”
Get full text
Article -
149
Evaluation of Computer Network Simulation Applications to Support Online Learning
Published 2022-12-01“…In this study, researchers evaluate and analyze several network simulation applications, to find out which applications are more efficient to use in learning computer networks, seen from the application capabilities in IP Address configuration, Subnetting, Routing. This study uses the observation method of computer network simulator applications that have been determined, namely the application of (1) Cisco Packet Tracer, (2) GNS3, (3) EVE-NG, (4) Boson Netsim, using the LORI research instrument version 1.5. …”
Get full text
Article -
150
Enabling low‐latency service function chains by merging duplicate match operations
Published 2022-09-01“…However, different NFs in SFCs are likely to perform identical operations of matching specific packet header fields (e.g., source IP address). Such a processing redundancy inevitably increases the overall end‐to‐end processing latency of SFCs, which in turn affects network management applications in their decision‐making process of handling short‐lived network events (e.g., microbursts). …”
Get full text
Article -
151
Protection of Personal Data in Turkish Law
Published 2018-09-01“…Within this context, not only the basic personal identification information such as the person’s name, surname, date and place of birth, but any other personal data that can be directly or indirectly make such person identifiable, such as phone number, motor vehicle plate number, social security number, passport number, personal background, photo, video or audio records, fingerprints, genetics data, IP address, e-mail address, equipment identities, hobbies, preferences, contact persons, group memberships, family information etc. are included within the scope of personal data. …”
Get full text
Article -
152
NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network
Published 2020-09-01“…These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. …”
Get full text
Article -
153
Mobile application development for cctv
Published 2014“…All will be on a Window server so any device can utilized it by connecting to its IP address. Web-based application is chosen because of its adaptability on many operation systems. …”
Get full text
Final Year Project (FYP) -
154
Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim
Published 2020“…Network test was analyzed by ping, traceroute and port scan of IP address of NodeMCU. For results, WOS can detect obstacles and give alert to users in different environment and MSD was success to detect the whereabout of WOS as it will satisfy the requirement for one of the 11th Malaysia Plan to make Smart Cities happen.…”
Get full text
Entrepreneurship Project -
155
Speech signal processing based on machine learning and complex processors for baby cry detection system
Published 2022“…Moreover, the work is integrated with machine learning and IP address to boost the detection mechanism.…”
Get full text
Article -
156
Adaptive architecture for radio frequency identification middleware
Published 2009“…Message adapter detects new application, resolves each application name to its IP address, and checks its activity in distributed network. …”
Get full text
Thesis -
157
A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks
Published 2021-03-01“…In this paper, a two-layer IP hopping-based MTD approach is proposed, in which device IP addresses or virtual IP addresses change or hop according to the network security status and requirements. …”
Get full text
Article -
158
Data Naming Mechanism of LEO Satellite Mega-Constellations for the Internet of Things
Published 2022-07-01“…The test simulation results show that, compared with the IP address, the ICN-HMcH naming mechanism can increase throughput by as much as 54% and reduce the transmission delay of the LEO mega satellites for the IoT by 53.97%. …”
Get full text
Article -
159
A Secure Internet of Things Smart Home Network: Design and Configuration
Published 2021-07-01“…To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. …”
Get full text
Article -
160
Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation
Published 2021-04-01“…While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. …”
Get full text
Article