-
661
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
Published 2016-12-01“…WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. …”
Get full text
Article -
662
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking
Published 2024-01-01“…The second addresses the sorts of attacks used by Man-In-The-Middle attacks and session hijacking on Transmission Control Protocol / Internet Protocol (TCP/IP). This demonstrates that Man-In-The-Middle attacks invade all layers and session hijacking attacks on only two, that is, the application and network layer. …”
Get full text
Article -
663
Sub-Tree-Based Approach for Reconfiguration of Light-Tree Pair without Flow Interruption in Sparse Wavelength Converter Network
Published 2021-05-01“…Multicast connections are required to meet the bandwidth requirements of multicast applications, such as Internet Protocol-based TeleVision (IPTV), distance learning, and telemedicine. …”
Get full text
Article -
664
Improving the Reliability of Optimised Link State Routing in a Smart Grid Neighbour Area Network based Wireless Mesh Network Using Multiple Metrics
Published 2017-02-01“…For smart meters transmitting Internet Protocol (IP) packets of varying sizes at different intervals, the proposed technique considers the constraints of NAN and the applications’ traffic characteristics. …”
Get full text
Article -
665
Remote Professional Media Production: Evaluation of Network Configuration That Satisfies Delay Requirements
Published 2021-01-01“…With the shift to the Internet Protocol (IP) in professional media production, the demand for a remote professional media production system (hereinafter “remote production”) is increasing. …”
Get full text
Article -
666
WPFD: Active User-Side Detection of Evil Twins
Published 2022-08-01“…The packet forwarding behavior generated by the evil twin and the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol are both used by the WPFD. …”
Get full text
Article -
667
Performance analysis of smart digital signage system based on software-defined IoT and invisible image sensor communication
Published 2016-07-01“…A performance analysis of this system showed the advantages of an SD-IoT network over an Internet protocol-based IoT network considering a queuing analysis for a dynamic link allocation process in the case of user access to the IoT network.…”
Get full text
Article -
668
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
Published 2022-12-01“…This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. …”
Get full text
Article -
669
Graph neural networks and cross-protocol analysis for detecting malicious IP addresses
Published 2022-09-01“…Abstract An internet protocol (IP) address is the foundation of the Internet, allowing connectivity between people, servers, Internet of Things, and services across the globe. …”
Get full text
Article -
670
Proposal for Low-Layer Metadata Collection Technology to Enhance IoT Metadata Utilization
Published 2023-01-01“…It is shown to reduce the load on the central processing unit (CPU) and reduce power consumption compared to Internet Protocol (IP) -based metadata collection (layer-3 protocol and above). …”
Get full text
Article -
671
Process Mining IPTV Customer Eye Gaze Movement Using Discrete-Time Markov Chains
Published 2023-02-01“…Meanwhile, the ongoing development of Internet Protocol TV (IPTV) has significantly enriched the TV customer experience, which is of great interest to researchers across academia and industry. …”
Get full text
Article -
672
An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices
Published 2018-05-01“…This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP) randomization, reactive protocol (port) scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. …”
Get full text
Article -
673
Latency Analysis of Wireless Networks for Proximity Services in Smart Home and Building Automation: The Case of Thread
Published 2019-01-01“…Thread is a new wireless protocol aiming at smart home and building automation (BA), which supports mesh networks and native Internet protocol connectivity. The latency of Thread should be carefully studied when used in user-friendly and safety-critical ProSe in smart home and BA. …”
Get full text
Article -
674
Easy and Secure Handling of Sensors and Actuators as Cloud-Based Service
Published 2020-01-01“…In order to unify different protocols, the service makes use of the Modbus TCP/IP (Transmission Control Protocol/Internet Protocol) protocol, one of the most commonly used by industry in local networks. …”
Get full text
Article -
675
Exploration of daily Internet data traffic generated in a smart university campus
Published 2018-10-01“…Keywords: Smart campus, Internet Protocol, Internet data traffic, Nigerian university, Smart education…”
Get full text
Article -
676
So many meetings, so little time : using IP videoconferencing to revitalize statewide committees
Published 2021“…Internet technologies continue to transform the library profession and redefine how we communicate with professional colleagues and peers. IP (Internet Protocol) videoconferencing provides increased opportunities for librarians to engage in virtual teamwork and e-collaborations. …”
Get full text
Journal Article -
677
Design of a microgrid energy management system featuring an economic dispatch module and a SCADA interface for real-time data acquisition: phase II
Published 2022“…In addition, due to a recent network upgrade in the lab, the internet protocol (IP) addresses of the devices and assets have been changed and the IP address of WAGO's Programmable Logic Controllers (PLCs) could not be updated. …”
Get full text
Final Year Project (FYP) -
678
Modeling and performance analysis of IP with MPLS/GMPLS over backbone networks
Published 2009“…Meanwhile, with the introduction of Generalized Multi–Protocol Label Switching (GMPLS) as the common control plane between optical crossconnects (OXCs) and electronic switching devices, the integration of Internet Protocol (IP) and Wavelength Division Multiplexing (WDM) can be efficiently achieved. …”
Get full text
Thesis -
679
ANALISIS KUALITAS VOIP YANG BERJALAN DI ATAS PROTOKOL DATAGRAM CONGESTION CONTROL PROTOCOL DAN PENGARUHNYA TERHADAP ALIRAN TCP DENGAN MENGGUNAKAN SIMULATOR NS-2
Published 2012“…In this time the Internet is not only used for sending data files or accessing a web site, but have been able to cater for multimedia applications such as video conferencing or Voice over Internet Protocol (VoIP). VoIP technology allows voice communication is done by utilizing the Internet media. …”
Thesis -
680
Incorporation of QoS in network mobility (NEMO) network
Published 2013“…It has been endorsed by Internet Engineering Task Force (IETF) to satisfy the requirements of new real-time applications. Internet Protocol was not designed taking into account mobility of users and terminals. …”
Get full text
Article