Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 11
1.
  • An Intelligent Framework fo... An Intelligent Framework for Cyber–Physical Satellite System and IoT-Aided Aerial Vehicle Security Threat Detection
    Alturki, Nazik; Aljrees, Turki; Umer, Muhammad ... Sensors (Basel, Switzerland), 08/2023, Letnik: 23, Številka: 16
    Journal Article
    Recenzirano
    Odprti dostop

    The small-drone technology domain is the outcome of a breakthrough in technological advancement for drones. The Internet of Things (IoT) is used by drones to provide inter-location services for ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
2.
  • IoTTPS: Ensemble RKSVM Mode... IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System
    Akram, Urooj; Sharif, Wareesa; Shahroz, Mobeen ... Sensors (Basel, Switzerland), 07/2023, Letnik: 23, Številka: 14
    Journal Article
    Recenzirano
    Odprti dostop

    An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
3.
  • Securing Smart Contracts in... Securing Smart Contracts in Fog Computing: Machine Learning-Based Attack Detection for Registration and Resource Access Granting
    Ehsan, Tahmina; Sana, Muhammad Usman; Ali, Muhammad Usman ... IEEE access, 2024, Letnik: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Smart contracts are becoming increasingly popular for managing transactions or activities in fog computing environments. However, the use of smart contracts for registration and resource access ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
4.
  • Collaborative approach to m... Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks
    Nam, Seung Yeob; Djuraev, Sirojiddin; Park, Minho Computer networks (Amsterdam, Netherlands : 1999), 12/2013, Letnik: 57, Številka: 18
    Journal Article
    Recenzirano

    In this paper, we propose a new mechanism for counteracting ARP (Address Resolution Protocol) poisoning-based Man-in-the-Middle (MITM) attacks in a subnet, where wired and wireless nodes can coexist. ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
5.
  • Defending HTTP Web Servers ... Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection
    Nam, Seung Yeob; Djuraev, Sirojiddin KSII transactions on Internet and information systems, 07/2014, Letnik: 8, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission ...
Celotno besedilo
Dostopno za: UL
6.
  • Defending HTTP Web Servers ... Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection
    Nam, Seung Yeob; Djuraev, Sirojiddin KSII transactions on Internet and information systems, 07/2014, Letnik: 8, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission ...
Celotno besedilo
Dostopno za: UL
7.
  • Channel-Hopping-Based Jammi... Channel-Hopping-Based Jamming Mitigation in Wireless LAN Considering Throughput and Fairness
    Djuraev, Sirojiddin; Nam, Seung Yeob Electronics (Basel), 11/2020, Letnik: 9, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Because of the popularity of wireless technology, jamming attack is one of the most critical issues in wireless networks. Wireless jamming attack is one type of denial-of-service attacks where ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
8.
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
9.
  • Channel hopping scheme to m... Channel hopping scheme to mitigate jamming attacks in wireless LANs
    Djuraev, Sirojiddin; Choi, Jin-Ghoo; Sohn, Kyu-Seek ... EURASIP journal on wireless communications and networking, 01/2017, Letnik: 2017, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Although a jamming attack is an important problem in Wi-Fi networks, there is no effective solution to this problem yet. In this paper, we propose a new approach to resolve jamming attacks in Wi-Fi ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
10.
  • Sybil attack detection in v... Sybil attack detection in vehicular network based on received signal strength
    Shrestha, Rakesh; Djuraev, Sirojiddin; Nam, Seung Yeob 2014 International Conference on Connected Vehicles and Expo (ICCVE), 11/2014
    Conference Proceeding

    Vehicular networks are vulnerable to many security threats. One of the security threats is Sybil attack, and traditional security solutions which are based on cryptography and centralized authority ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1 2
zadetkov: 11

Nalaganje filtrov