Showing 141 - 160 results of 319 for search '"IP address"', query time: 0.09s Refine Results
  1. 141

    Innovative Knowledge Management Collaboration Through Internet of Things by Abdullah, Embong, Muhammad Wasif, Nabeel

    Published 2015
    “…The IOT devices and system are integrated with internet using cellular, WIFI, 3G module, Wimax and each device is assigned a unique IP address which uses IPv6 address space. The benefit of these devices is that they work under low power and low bandwidth which make them special innovation. …”
    Get full text
    Conference or Workshop Item
  2. 142

    DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology by Rahmeh Fawaz Ibrahim, Qasem Abu Al-Haija, Ashraf Ahmad

    Published 2022-09-01
    “…Second, we suggest tracing and recording the IP address of malicious devices inside the blockchain to prevent them from connecting and communicating with the IoT networks. …”
    Get full text
    Article
  3. 143

    Combinatorial Subset Difference—IoT-Friendly Subset Representation and Broadcast Encryption by Jiwon Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh

    Published 2020-06-01
    “…The experimental result shows that our CSD saves the header size by 17% on average and more than 1000 times when assuming a specific IoT example of IP address with 20 wildcards and <inline-formula> <math display="inline"> <semantics> <msup> <mn>2</mn> <mn>20</mn> </msup> </semantics> </math> </inline-formula> total users, compared to the SD-based broadcast encryption. …”
    Get full text
    Article
  4. 144

    A survey of methods for encrypted network traffic fingerprinting by Sunghyun Yu, Yoojae Won

    Published 2023-01-01
    “…They are expected to be less effective because cloud-based and software-defined networks have ambiguous boundaries, and network configurations not dependent on existing IP address schemes increase. Herein, we investigate and analyze the Transport Layer Security (TLS) fingerprinting technique, a technology that can analyze and classify encrypted traffic without decryption while addressing the problems of existing network fingerprinting techniques. …”
    Get full text
    Article
  5. 145

    IDENTIFICATION AND INDIVIDUALIZATION OF A NATURAL PERSON IN THE INTERNET COMPUTER NETWORK: LEGAL ASPECTS by Yevgen Michurin

    Published 2022-12-01
    “…The means of identification of an individual on the Internet may be his/her name, nickname, image, URL of a web page, domain name, IP address, e-mail address, etc. The range of means of individualization of an individual on the Internet is not exhaustive.…”
    Get full text
    Article
  6. 146

    Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System by Tati Ernawati, Fikri Faiz Fadhlur Rachmat

    Published 2021-02-01
    “…The security system was build by configuring the IP address and network system devices (server, remote admin, client attacker). …”
    Get full text
    Article
  7. 147

    Fast Conflict Detection for Multi-Dimensional Packet Filters by Chun-Liang Lee, Guan-Yu Lin, Yaw-Chung Chen

    Published 2022-08-01
    “…In recent years, many conflict detection algorithms have been proposed, but most of them detect conflicts for only prefix fields (i.e., source/destination IP address fields) of filters. For greater practicality, conflict detection must include non-prefix fields such as source/destination IP port fields and the protocol field. …”
    Get full text
    Article
  8. 148

    IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes by Bello Musa Yakubu, Majid Iqbal Khan, Pattarasinee Bhattarakosol

    Published 2022-11-01
    “…Results from this study show that the proposed model has an average of 21.1% more resistance to a growing number of adversaries than the benchmark models, thus revealing that the model is better suited for the security of IoT address management servers in smart homes, thereby enhancing resilience against related threats and the success of IP address management.…”
    Get full text
    Article
  9. 149

    Evaluation of Computer Network Simulation Applications to Support Online Learning by Ismoyo Putro, Puspanda Hatta, Agus Efendi

    Published 2022-12-01
    “…In this study, researchers evaluate and analyze several network simulation applications, to find out which applications are more efficient to use in learning computer networks, seen from the application capabilities in IP Address configuration, Subnetting, Routing. This study uses the observation method of computer network simulator applications that have been determined, namely the application of (1) Cisco Packet Tracer, (2) GNS3, (3) EVE-NG, (4) Boson Netsim, using the LORI research instrument version 1.5. …”
    Get full text
    Article
  10. 150

    Enabling low‐latency service function chains by merging duplicate match operations by Dong Zhang, Kaiwei Guo, Xiang Chen, Xuan Liu

    Published 2022-09-01
    “…However, different NFs in SFCs are likely to perform identical operations of matching specific packet header fields (e.g., source IP address). Such a processing redundancy inevitably increases the overall end‐to‐end processing latency of SFCs, which in turn affects network management applications in their decision‐making process of handling short‐lived network events (e.g., microbursts). …”
    Get full text
    Article
  11. 151

    Protection of Personal Data in Turkish Law by YILDIZ Sevil

    Published 2018-09-01
    “…Within this context, not only the basic personal identification information such as the person’s name, surname, date and place of birth, but any other personal data that can be directly or indirectly make such person identifiable, such as phone number, motor vehicle plate number, social security number, passport number, personal background, photo, video or audio records, fingerprints, genetics data, IP address, e-mail address, equipment identities, hobbies, preferences, contact persons, group memberships, family information etc. are included within the scope of personal data. …”
    Get full text
    Article
  12. 152

    NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network by Prakash Veeraraghavan, Dalal Hanna, Eric Pardede

    Published 2020-09-01
    “…These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. …”
    Get full text
    Article
  13. 153

    Mobile application development for cctv by Ha, Duy Long

    Published 2014
    “…All will be on a Window server so any device can utilized it by connecting to its IP address. Web-based application is chosen because of its adaptability on many operation systems. …”
    Get full text
    Final Year Project (FYP)
  14. 154

    Wearable obstacle sensor for blind people with mobile application / Siti Sarah Hashim by Hashim, Siti Sarah

    Published 2020
    “…Network test was analyzed by ping, traceroute and port scan of IP address of NodeMCU. For results, WOS can detect obstacles and give alert to users in different environment and MSD was success to detect the whereabout of WOS as it will satisfy the requirement for one of the 11th Malaysia Plan to make Smart Cities happen.…”
    Get full text
    Entrepreneurship Project
  15. 155

    Speech signal processing based on machine learning and complex processors for baby cry detection system by Al-Mashhadani, Abdul Razak F. Shahatha, Tee, Fu Keat, Kolandaisamy, Raenu, Nandy, Tarak

    Published 2022
    “…Moreover, the work is integrated with machine learning and IP address to boost the detection mechanism.…”
    Get full text
    Article
  16. 156

    Adaptive architecture for radio frequency identification middleware by Mardiyono, Mardiyono

    Published 2009
    “…Message adapter detects new application, resolves each application name to its IP address, and checks its activity in distributed network. …”
    Get full text
    Thesis
  17. 157

    A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks by Pengkun Wang, Momiao Zhou, Zhizhong Ding

    Published 2021-03-01
    “…In this paper, a two-layer IP hopping-based MTD approach is proposed, in which device IP addresses or virtual IP addresses change or hop according to the network security status and requirements. …”
    Get full text
    Article
  18. 158

    Data Naming Mechanism of LEO Satellite Mega-Constellations for the Internet of Things by Mingfei Xia, Shengbo Hu, Hongqiu Luo, Tingting Yan, Yanfeng Shi

    Published 2022-07-01
    “…The test simulation results show that, compared with the IP address, the ICN-HMcH naming mechanism can increase throughput by as much as 54% and reduce the transmission delay of the LEO mega satellites for the IoT by 53.97%. …”
    Get full text
    Article
  19. 159

    A Secure Internet of Things Smart Home Network: Design and Configuration by Jinsuk Baek, Munene W. Kanampiu, Cheonshik Kim

    Published 2021-07-01
    “…To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. …”
    Get full text
    Article
  20. 160

    Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation by Mohd Nizam Osman, Khairul Anwar Sedek, Nor Arzami Othman, Muhammad Afiqhakimi Rosli, Mushahadah Maghribi

    Published 2021-04-01
    “…While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity.  …”
    Get full text
    Article