Found: 405
Select item for more details and to access through your institution.
Enhancing Cybersecurity by relying on a Botnet Attack Tracking Model using Harris Hawks Optimization.
- Published in:
- International Journal for Computers & Their Applications, 2024, v. 31, n. 2, p. 103
- By:
- Publication type:
- Article
A novel P2P IPTV system for IPv4/v6 networks.
- Published in:
- Multimedia Tools & Applications, 2014, v. 72, n. 1, p. 967, doi. 10.1007/s11042-013-1477-x
- By:
- Publication type:
- Article
Monitoring routing status of UAV networks with NB-IoT.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 17, p. 19064, doi. 10.1007/s11227-023-05411-z
- By:
- Publication type:
- Article
Feasible DDoS attack source traceback scheme by deterministic multiple packet marking mechanism.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 6, p. 4232, doi. 10.1007/s11227-018-2323-8
- By:
- Publication type:
- Article
Identifying critical autonomous systems in the Internet.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 10, p. 4965, doi. 10.1007/s11227-018-2336-3
- By:
- Publication type:
- Article
EDGE ANALYTICS ON INTERNET OF THINGS: A SURVEY.
- Published in:
- i-Manager's Journal on Computer Science, 2017, v. 5, n. 4, p. 36
- By:
- Publication type:
- Article
Cyberattack Defense with Appropriate Address-changing Frequency in Industrial Control Systems.
- Published in:
- Sensors & Materials, 2022, v. 34, n. 7, Part 1, p. 2567, doi. 10.18494/SAM3843
- By:
- Publication type:
- Article
İŞ TATMİNİ VE İŞ PERFORMANSININ, İŞTEN AYRILMA NİYETİ ÜZERİNDEKİ ETKİSİNDE ELEŞTİREL DÜŞÜNCENİN ARACI ROLÜ.
- Published in:
- Journal of Mehmet Akif Ersoy University Social Science Institute, 2022, n. 36, p. 137, doi. 10.20875/makusobed.1159239
- By:
- Publication type:
- Article
SR 架构下的软件定义信息中心网络概率路由策略.
- Published in:
- Telecommunication Engineering, 2021, v. 61, n. 2, p. 137, doi. 10.3969/j.issn.1001-893x.2021.02.002
- By:
- Publication type:
- Article
空中异构战术网络IP 通信架构及协议开销分析.
- Published in:
- Telecommunication Engineering, 2019, v. 59, n. 9, p. 1020, doi. 10.3969/j.issn.1001-893x.2019.09.006
- By:
- Publication type:
- Article
OpenFDA: an innovative platform providing access to a wealth of FDA's publicly available data.
- Published in:
- 2016
- By:
- Publication type:
- journal article
EU: Infringement of Data Protection Law By Trans–mission of Pseudonymous Data?
- Published in:
- Computer Law Review International, 2024, v. 25, n. 1, p. 26, doi. 10.9785/cri-2024-250107
- Publication type:
- Article
USA: Personal jurisdiction Over Out-of-State Defendant.
- Published in:
- Computer Law Review International, 2020, v. 21, n. 6, p. 173, doi. 10.9785/cri-2020-210604
- Publication type:
- Article
The characteristics and operations of "online pharmacies" investigated in relation to medicines popularised during the coronavirus pandemic: a cross-sectional study.
- Published in:
- Frontiers in Pharmacology, 2024, p. 1, doi. 10.3389/fphar.2024.1346604
- By:
- Publication type:
- Article
Online Worker Fraud and Evolving Threats to the Integrity of MTurk Data: A Discussion of Virtual Private Servers and the Limitations of IP-Based Screening Procedures.
- Published in:
- Behavioral Research in Accounting, 2020, v. 32, n. 1, p. 119, doi. 10.2308/bria-18-044
- By:
- Publication type:
- Article
A Comparative Analysis of Various Forensic Tools used in Secure Digital Transmission.
- Published in:
- Turkish Online Journal of Qualitative Inquiry, 2021, v. 12, n. 9, p. 2004
- By:
- Publication type:
- Article
A Comparative Analysis of Various Forensic Tools used in Secure Digital Transmission.
- Published in:
- Turkish Online Journal of Qualitative Inquiry, 2021, v. 12, n. 9, p. 1810
- By:
- Publication type:
- Article
Database techniques for resilient network monitoring and inspection.
- Published in:
- Telkomnika, 2020, v. 18, n. 5, p. 2412, doi. 10.12928/TELKOMNIKA.v18i5.14305
- By:
- Publication type:
- Article
Website Content Analysis Using Clickstream Data and Apriori Algorithm.
- Published in:
- Telkomnika, 2018, v. 16, n. 5, p. 2118, doi. 10.12928/TELKOMNIKA.v16i5.7573
- By:
- Publication type:
- Article
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 6, p. 733, doi. 10.3390/sym16060733
- By:
- Publication type:
- Article
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 12, p. 2556, doi. 10.3390/sym14122556
- By:
- Publication type:
- Article
Supervised Learning-Based Fast, Stealthy, and Active NAT Device Identification Using Port Response Patterns.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 9, p. 1444, doi. 10.3390/sym12091444
- By:
- Publication type:
- Article
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 2, p. 176, doi. 10.3390/sym11020176
- By:
- Publication type:
- Article
DETECTING DDOS ATTACK IN AN AGENT-BASED VIRTUAL KNOWLEDGE COMMUNITY.
- Published in:
- Annals. Computer Science Series, 2013, v. 11, n. 2, p. 54
- By:
- Publication type:
- Article
Sustainable Teaching and Learning through a Mobile Application: A Case Study.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 11, p. 6663, doi. 10.3390/su14116663
- By:
- Publication type:
- Article
Rebuilding a Cluster While Protecting Knowledge within Low-Medium-Tech Supplier SMEs: A Spanish and French Comparison.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 20, p. 11313, doi. 10.3390/su132011313
- By:
- Publication type:
- Article
PREVENTION OF DNS AMPLIFICATION ATTACKS.
- Published in:
- Annals of DAAAM & Proceedings, 2023, v. 34, p. 82, doi. 10.2507/34th.daaam.proceedings.012
- By:
- Publication type:
- Article
In Memoriam: William I. Norwood Jr (1941-2020).
- Published in:
- 2021
- By:
- Publication type:
- journal article
Designing a New Scalable Autoconfiguration Protocol with Optimal Header Selection for Large Scale MANETs.
- Published in:
- Journal of Circuits, Systems & Computers, 2020, v. 29, n. 5, p. N.PAG, doi. 10.1142/S0218126620500681
- By:
- Publication type:
- Article
Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 36, n. 3, p. 3691, doi. 10.32604/iasc.2023.036946
- By:
- Publication type:
- Article
Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 35, n. 1, p. 243, doi. 10.32604/iasc.2023.025719
- By:
- Publication type:
- Article
Saving the Bandwidth of IPv6 Networks Using the Fields of the Packet Header.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1971, doi. 10.32604/iasc.2022.021458
- By:
- Publication type:
- Article
Framework for Cybersecurity Centers to Mass Scan Networks.
- Published in:
- Intelligent Automation & Soft Computing, 2020, v. 26, n. 6, p. 1319, doi. 10.32604/iasc.2020.013678
- By:
- Publication type:
- Article
CONTROLLING AND ANALYSIS OF IP FALSIFYING USING ARP METHOD.
- Published in:
- Ilkogretim Online, 2021, v. 20, n. 4, p. 995, doi. 10.17051/ilkonline.2021.04.107
- By:
- Publication type:
- Article
Using multi-address generation and duplicate address detection to prevent DoS in IPv6.
- Published in:
- IET Communications (Wiley-Blackwell), 2019, v. 13, n. 10, p. 1390, doi. 10.1049/iet-com.2018.5686
- By:
- Publication type:
- Article
جرمية التحاٌل على عنوان بروتوكول االنرتنٍتاالنرتنٍت )ip(.
- Published in:
- Al- Mouhakiq Al-Hilly Journal for Legal & Political Science, 2023, v. 15, n. 2, p. 507
- By:
- Publication type:
- Article
Implementation of Dual Internet Links for Industrial IoT to Provide Safe Digital Commands for Process Automations.
- Published in:
- Journal Européen des Systèmes Automatisés, 2023, v. 56, n. 1, p. 55, doi. 10.18280/jesa.560108
- By:
- Publication type:
- Article
Threshold-based distributed DDoS attack detection in ISP networks.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 4, p. 1796, doi. 10.3906/elk-1712-3
- By:
- Publication type:
- Article
Malicious Source Detection and Threats Mitigation in Named Data Networking Using Deep Learning.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2024, v. 17, n. 5, p. 440, doi. 10.22266/ijies2024.1031.34
- By:
- Publication type:
- Article
Hybrid Particle Swarm and Gray Wolf Optimization Algorithm for IoT Intrusion Detection System.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 4, p. 66, doi. 10.22266/ijies2021.0831.07
- By:
- Publication type:
- Article
Streamlining the Fight Against Child Sex Offenders Trough EU Regulation of IP address.
- Published in:
- Journal of Eastern European Criminal Law, 2020, n. 1, p. 77
- By:
- Publication type:
- Article
Inappropriate prescribing in patients with kidney disease: A rapid review of prevalence, associated clinical outcomes and impact of interventions.
- Published in:
- Basic & Clinical Pharmacology & Toxicology, 2024, v. 134, n. 4, p. 439, doi. 10.1111/bcpt.13986
- By:
- Publication type:
- Article
Privacy-Preserving Passive DNS.
- Published in:
- Computers (2073-431X), 2020, v. 9, n. 3, p. 64, doi. 10.3390/computers9030064
- By:
- Publication type:
- Article
COMPLEX GEOGRAPHY OF THE INTERNET NETWORK.
- Published in:
- Acta Physica Polonica B, 2011, v. 42, n. 5, p. 1057, doi. 10.5506/APhysPolB.42.1057
- By:
- Publication type:
- Article
Scaling up qualitative research to harness the capacity of lay people in invasive plant management.
- Published in:
- Conservation Biology, 2022, v. 36, n. 6, p. 1, doi. 10.1111/cobi.13929
- By:
- Publication type:
- Article
A Study on Exploitable DRDoS Amplifiers in Europe.
- Published in:
- International Journal of Information Security Science, 2021, v. 10, n. 2, p. 26
- By:
- Publication type:
- Article
COVID-19 Treatments Sold Online Without Prescription Requirements in the United States: Cross-sectional Study Evaluating Availability, Safety and Marketing of Medications.
- Published in:
- 2022
- By:
- Publication type:
- journal article
Hotlist and stale content update mitigation in local databases for DNS flooding attacks.
- Published in:
- Telecommunication Systems, 2022, v. 81, n. 3, p. 417, doi. 10.1007/s11235-022-00950-x
- By:
- Publication type:
- Article
Phishing website detection using support vector machines and nature-inspired optimization algorithms.
- Published in:
- Telecommunication Systems, 2021, v. 76, n. 1, p. 17, doi. 10.1007/s11235-020-00739-w
- By:
- Publication type:
- Article
Handling mobility in future publish-subscribe information-centric networks.
- Published in:
- Telecommunication Systems, 2013, v. 53, n. 3, p. 299, doi. 10.1007/s11235-013-9699-9
- By:
- Publication type:
- Article