Dastres, Roza Soori, Mohsen
Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of...
Kim, Pyung Lee, Younho Hong, Youn-Sik Kwon, Taekyoung
Published in
Sensors (Basel, Switzerland)
To meet password selection criteria of a server, a user occasionally needs to provide multiple choices of password candidates to an on-line password meter, but such user-chosen candidates tend to be derived from the user’s previous passwords—the meter may have a high chance to acquire information about a user’s passwords employed for various purpos...
You, Xiaohu Wang, Cheng-Xiang Huang, Jie Gao, Xiqi Zhang, Zaichen Wang, Mao Huang, Yongming Zhang, Chuan Jiang, Yanxiang Wang, Jiaheng
...
Published in
Science China Information Sciences
The fifth generation (5G) wireless communication networks are being deployed worldwide from 2020 and more capabilities are in the process of being standardized, such as mass connectivity, ultra-reliability, and guaranteed low latency. However, 5G will not meet all requirements of the future in 2030 and beyond, and sixth generation (6G) wireless com...
Shen, Shuaiqi Zhang, Kuan Zhou, Yi Ci, Song
Published in
Science China Information Sciences
The flourish of 5th generation wireless systems (5G) network has brought numerous benefits to the Internet of Things (IoT) with universal connectivity, improved data rate, and decreased latency. The development of IoT extends the computation-intensive applications from centralized servers to the edge of the network, promoting the paradigm of edge c...
Rytel, Marcin Felkner, Anna Janiszewski, Marek
Published in
Sensors (Basel, Switzerland)
The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on...
Nazih, Waleed Hifny, Yasser Elkilani, Wail S. Dhahri, Habib Abdelkader, Tamer
Published in
Sensors (Basel, Switzerland)
Many companies have transformed their telephone systems into Voice over IP (VoIP) systems. Although implementation is simple, VoIP is vulnerable to different types of attacks. The Session Initiation Protocol (SIP) is a widely used protocol for handling VoIP signaling functions. SIP is unprotected against attacks because it is a text-based protocol ...
Carvalho Ota, Fernando Kaway Meira, Jorge Augusto Frank, Raphaël State, Radu
The number of smartphone users recently surpassed the numbers of desktop users on Internet, and opened up countless development challenges and business opportunities. Not only the fact that the majority of users are connected using their smartphones, but the number of Internet users in general has popularized the massive use of data-driven applicat...
Kalbo, Naor Mirsky, Yisroel Shabtai, Asaf Elovici, Yuval
Published in
Sensors (Basel, Switzerland)
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s pri...
anděra, jiří
Tato diplomová práce se zaobírá problematikou detekce anomálií v sítích. V teoretické části jsou sepsány metody, které využívající statistický přístup, až po metody strojového učení. Následně je vybrána jedna z popsaných metod. V rámci dané metody došlo ke zvolení dvou algoritmů, \textit{Isolation Forest} a \textit{Local Outlier Factor }. Bylo vytv...
Besimi, Adrian Shehu, Visar
Published in
SEEU Review
In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily...