Showing 661 - 680 results of 809 for search '"Internet Protocol"', query time: 0.19s Refine Results
  1. 661

    A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network by Sandeep Pirbhulal, Heye Zhang, Md Eshrat E Alahi, Hemant Ghayvat, Subhas Chandra Mukhopadhyay, Yuan-Ting Zhang, Wanqing Wu

    Published 2016-12-01
    “…WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. …”
    Get full text
    Article
  2. 662

    Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking by Muteeb Bin Muzammil, Muhammad Bilal, Sahar Ajmal, Sandile C. Shongwe, Yazeed Y. Ghadi

    Published 2024-01-01
    “…The second addresses the sorts of attacks used by Man-In-The-Middle attacks and session hijacking on Transmission Control Protocol / Internet Protocol (TCP/IP). This demonstrates that Man-In-The-Middle attacks invade all layers and session hijacking attacks on only two, that is, the application and network layer. …”
    Get full text
    Article
  3. 663

    Sub-Tree-Based Approach for Reconfiguration of Light-Tree Pair without Flow Interruption in Sparse Wavelength Converter Network by Amanvon Ferdinand Atta, Joël Christian Adépo, Bernard Cousin, Souleymane Oumtanaga

    Published 2021-05-01
    “…Multicast connections are required to meet the bandwidth requirements of multicast applications, such as Internet Protocol-based TeleVision (IPTV), distance learning, and telemedicine. …”
    Get full text
    Article
  4. 664

    Improving the Reliability of Optimised Link State Routing in a Smart Grid Neighbour Area Network based Wireless Mesh Network Using Multiple Metrics by Yakubu Tsado, Kelum A. A. Gamage, Bamidele Adebisi, David Lund, Khaled M. Rabie, Augustine Ikpehai

    Published 2017-02-01
    “…For smart meters transmitting Internet Protocol (IP) packets of varying sizes at different intervals, the proposed technique considers the constraints of NAN and the applications’ traffic characteristics. …”
    Get full text
    Article
  5. 665

    Remote Professional Media Production: Evaluation of Network Configuration That Satisfies Delay Requirements by Junichiro Kawamoto, Ryo Shirato, Tsuyoshi Nakatogawa, Takuya Kurakake

    Published 2021-01-01
    “…With the shift to the Internet Protocol (IP) in professional media production, the demand for a remote professional media production system (hereinafter “remote production”) is increasing. …”
    Get full text
    Article
  6. 666

    WPFD: Active User-Side Detection of Evil Twins by Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Chia-Hao Lee, Chuan-Sheng Wang, Ting-Cheng Chang

    Published 2022-08-01
    “…The packet forwarding behavior generated by the evil twin and the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol are both used by the WPFD. …”
    Get full text
    Article
  7. 667

    Performance analysis of smart digital signage system based on software-defined IoT and invisible image sensor communication by Mohammad Arif Hossain, Amirul Islam, Nam Tuan Le, Yong Tae Lee, Hyun Woo Lee, Yeong Min Jang

    Published 2016-07-01
    “…A performance analysis of this system showed the advantages of an SD-IoT network over an Internet protocol-based IoT network considering a queuing analysis for a dynamic link allocation process in the case of user access to the IoT network.…”
    Get full text
    Article
  8. 668

    RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks by Zakwan AlArnaout, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, Ahmed Shdefat

    Published 2022-12-01
    “…This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. …”
    Get full text
    Article
  9. 669

    Graph neural networks and cross-protocol analysis for detecting malicious IP addresses by Yonghong Huang, Joanna Negrete, John Wagener, Celeste Fralick, Armando Rodriguez, Eric Peterson, Adam Wosotowsky

    Published 2022-09-01
    “…Abstract An internet protocol (IP) address is the foundation of the Internet, allowing connectivity between people, servers, Internet of Things, and services across the globe. …”
    Get full text
    Article
  10. 670

    Proposal for Low-Layer Metadata Collection Technology to Enhance IoT Metadata Utilization by Ryota Shiina, Shinya Tamaki, Che Huang, Tomoya Hatano, Takashi Yamada, Tatsuya Shimada, Tomohiro Taniguchi

    Published 2023-01-01
    “…It is shown to reduce the load on the central processing unit (CPU) and reduce power consumption compared to Internet Protocol (IP) -based metadata collection (layer-3 protocol and above). …”
    Get full text
    Article
  11. 671

    Process Mining IPTV Customer Eye Gaze Movement Using Discrete-Time Markov Chains by Zhi Chen, Shuai Zhang, Sally McClean, Fionnuala Hart, Michael Milliken, Brahim Allan, Ian Kegel

    Published 2023-02-01
    “…Meanwhile, the ongoing development of Internet Protocol TV (IPTV) has significantly enriched the TV customer experience, which is of great interest to researchers across academia and industry. …”
    Get full text
    Article
  12. 672

    An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices by Hwankuk Kim, Taeun Kim, Daeil Jang

    Published 2018-05-01
    “…This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP) randomization, reactive protocol (port) scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. …”
    Get full text
    Article
  13. 673

    Latency Analysis of Wireless Networks for Proximity Services in Smart Home and Building Automation: The Case of Thread by Dapeng Lan, Zhibo Pang, Carlo Fischione, Yu Liu, Amir Taherkordi, Frank Eliassen

    Published 2019-01-01
    “…Thread is a new wireless protocol aiming at smart home and building automation (BA), which supports mesh networks and native Internet protocol connectivity. The latency of Thread should be carefully studied when used in user-friendly and safety-critical ProSe in smart home and BA. …”
    Get full text
    Article
  14. 674

    Easy and Secure Handling of Sensors and Actuators as Cloud-Based Service by Reyes Sanchez-Herrera, Marco A. Marquez, Jose M. Andujar

    Published 2020-01-01
    “…In order to unify different protocols, the service makes use of the Modbus TCP/IP (Transmission Control Protocol/Internet Protocol) protocol, one of the most commonly used by industry in local networks. …”
    Get full text
    Article
  15. 675

    Exploration of daily Internet data traffic generated in a smart university campus by Oluwaseun J. Adeyemi, Segun I. Popoola, Aderemi A. Atayero, David G. Afolayan, Mobolaji Ariyo, Emmanuel Adetiba

    Published 2018-10-01
    “…Keywords: Smart campus, Internet Protocol, Internet data traffic, Nigerian university, Smart education…”
    Get full text
    Article
  16. 676

    So many meetings, so little time : using IP videoconferencing to revitalize statewide committees by Lombardo, Nancy, Hansen, Carol

    Published 2021
    “…Internet technologies continue to transform the library profession and redefine how we communicate with professional colleagues and peers. IP (Internet Protocol) videoconferencing provides increased opportunities for librarians to engage in virtual teamwork and e-collaborations. …”
    Get full text
    Journal Article
  17. 677

    Design of a microgrid energy management system featuring an economic dispatch module and a SCADA interface for real-time data acquisition: phase II by Chee, Sin Hwee

    Published 2022
    “…In addition, due to a recent network upgrade in the lab, the internet protocol (IP) addresses of the devices and assets have been changed and the IP address of WAGO's Programmable Logic Controllers (PLCs) could not be updated. …”
    Get full text
    Final Year Project (FYP)
  18. 678

    Modeling and performance analysis of IP with MPLS/GMPLS over backbone networks by Shao, Xuguang

    Published 2009
    “…Meanwhile, with the introduction of Generalized Multi–Protocol Label Switching (GMPLS) as the common control plane between optical crossconnects (OXCs) and electronic switching devices, the integration of Internet Protocol (IP) and Wavelength Division Multiplexing (WDM) can be efficiently achieved. …”
    Get full text
    Thesis
  19. 679

    ANALISIS KUALITAS VOIP YANG BERJALAN DI ATAS PROTOKOL DATAGRAM CONGESTION CONTROL PROTOCOL DAN PENGARUHNYA TERHADAP ALIRAN TCP DENGAN MENGGUNAKAN SIMULATOR NS-2 by , I Dewa Made Bayu Atmaja Darmawan, , Dr.-Ing. Mhd. Reza M.I. Pulungan, S.Si., M.Sc

    Published 2012
    “…In this time the Internet is not only used for sending data files or accessing a web site, but have been able to cater for multimedia applications such as video conferencing or Voice over Internet Protocol (VoIP). VoIP technology allows voice communication is done by utilizing the Internet media. …”
    Thesis
  20. 680

    Incorporation of QoS in network mobility (NEMO) network by Hussien, Loay Faisal, Hassan Abdalla Hashim, Aisha, El-Hazary, Ismail, Hassan, Wan Haslina, Habaebi, Mohamed Hadi

    Published 2013
    “…It has been endorsed by Internet Engineering Task Force (IETF) to satisfy the requirements of new real-time applications. Internet Protocol was not designed taking into account mobility of users and terminals. …”
    Get full text
    Article