You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
DDOS Attack Detection in High-Speed Network
Two forms of DoS attack are troubling, DoS and DDoS (DDoS). Typically, DDoS attacks occur through linked devices from numerous locations. The attack can cause unusual activity that interrupts the regular traffic of specific servers, services, and networks through data bombardment from nearby infrastructure. This unusual activity creates tremendous continuous service requests to the servers and networks, making it difficult to identify a trustworthy source.
  • 1.1K
  • 11 Aug 2023
Topic Review
Securing Internet of Things Applications Using Key Management
The Internet of Things (IoT) emerged when everyday objects began connecting to the Internet and interacting with each other autonomously without human intervention. IoT devices follow the IEEE 802.15.4 standard to enable network connectivity for resource-constrained devices using short-range, lightweight communication protocols.
  • 1.1K
  • 07 Apr 2024
Topic Review
Cybersecurity: Threats, Strategies, and Future Directions
Cybersecurity has become a critical issue in the digital age, as individuals, businesses, and governments face an ever-evolving cyber threat landscape. This research provides an overview of the different types of cyber threats, cybersecurity strategies, current challenges, mitigation strategies, the role of AI in this context, examples of attacks, countries pioneers in this field, and recommendations for policymakers. The research highlights the importance of a multi-layered approach to cybersecurity that incorporates prevention, detection, and response strategies. The research also discusses the potential of emerging technologies, such as artificial intelligence and quantum computing, to revolutionize cybersecurity.
  • 1.1K
  • 22 May 2023
Topic Review
Cybersecurity for AI Systems
Advances in Artificial Intelligence (AI) technology have contributed to the enhancement of cybersecurity capabilities of traditional systems with applications that include detection of intrusion, malware, code vulnerabilities and anomalies. However, these systems with embedded machine learning models have opened themselves to a new set of vulnerabilities, commonly known as AI attacks.
  • 1.1K
  • 16 May 2023
Topic Review
Microgrids Cybersecurity
Microgrids are growing in importance in the Smart Grid paradigm for power systems. Microgrid security is becoming crucial since these systems increasingly rely on information and communication technologies. Many technologies have been proposed in the last few years for the protection of industrial control systems, ranging from cryptography, network security, security monitoring systems, and innovative control strategies resilient to cyber-attacks.
  • 1.1K
  • 08 Dec 2021
Topic Review
Security of the Internet of Things
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate their efforts on system security. Any vulnerability could lead to a system failure or cyberattack, which would have a large-scale impact. With billions of interconnected devices, ensuring robust security measures is crucial to safeguard sensitive data, protect user privacy, and mitigate potential cyber threats. Failure to prioritize IoT security could have far-reaching consequences, jeopardizing individuals, organizations, and even critical infrastructure. IoT security is a protection strategy and defense mechanism that protects against the possibility of cyberattacks that specifically target physically linked IoT devices. IoT security teams are currently dealing with growing difficulties, such as inventories, operations, diversity, ownership, data volume, threats, etc.
  • 1.1K
  • 16 May 2023
Topic Review
Distributed Denial-of-Service Attacks
With the rapid advancement and transformation of technology, information and communication technologies (ICT), in particular, has attracted everyone’s attention. The attackers took advantage of this and can be caused serious problems, such as malware attacks, ransomware, SQL injection attack and so on. One of the dominant attacks, known as distributed denial-of-service (DDoS), has been observed as the main reason for information hacking.
  • 1.1K
  • 21 Sep 2022
Topic Review
Optical Computing
Optical information processing is introduced and established by utilizing all of light’s attributes of speed and parallelism to handle data at a high rate. The data are represented as a light wave or graphic. The inherent parallel processing of optical computing (OC) was frequently noted as a fundamental benefit of optical processing over electronic processing employing predominantly serial processors.
  • 1.1K
  • 30 Jun 2022
Topic Review
WBAN Authentication Protocols for Intra-BAN Tier
Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS uses wearable devices with sensors to collect patients’ data and transmit the data to the controller node via a public channel.
  • 1.0K
  • 26 Aug 2022
Topic Review
Automatic Barrier Coverage in Smart City
Barrier coverage is a fundamental application in wireless sensor networks, which are widely used for smart cities. In applications, the sensors form a barrier for the intruders and protect an area through intrusion detection.
  • 1.0K
  • 23 Nov 2023
Topic Review
The DESMOS Project
“DESMOS”, a novel ecosystem for the interconnection of smart infrastructures, mobile and wearable devices, and applications, to provide a secure environment for visitors and tourists. The presented solution brings together state-of-the-art IoT technologies, crowdsourcing, localization through BLE, and semantic reasoning, following a privacy and security-by-design approach to ensure data anonymization and protection. Despite the COVID-19 pandemic, the solution was tested, validated, and evaluated via two pilots in almost real settings—involving a fewer density of people than planned—in Trikala, Thessaly, Greece. 
  • 981
  • 29 Sep 2021
Topic Review
Routing Protocol for Wireless Sensor Networks
Wireless sensor networks (WSNs), constrained by limited resources, demand routing strategies that prioritize energy efficiency. The tactic of cooperative routing, which leverages the broadcast nature of wireless channels, has garnered attention for its capability to amplify routing efficacy.
  • 968
  • 18 Dec 2023
Topic Review
Industrial IoT Network Infrastructure
The Internet of Things (IoT) is an innovative technology that presents effective and attractive solutions to revolutionize various domains. Numerous solutions based on the IoT have been designed to automate industries, manufacturing units, and production houses to mitigate human involvement in hazardous operations. The industrial IoT (IIoT) network infrastructure is the backbone of the IoT for industries, and helps to connect many sensory, physical, and network devices to improve product quality and the manufacturing process, thereby playing an important part in the growth of IIoT. The infrastructure in IoT-enabled industrial network architecture comprises the industrial network platform, the network topology, and protocols.
  • 930
  • 29 Jan 2024
Topic Review
IoT's Impact: From Healthcare to Smart City Solutions
The Internet of Things (IoT) technology and devices represent an exciting field in computer science that is rapidly emerging worldwide. The demand for automation and efficiency has also been a contributing factor to the advancements in this technology. The proliferation of IoT devices coincides with advancements in wireless networking technologies, driven by the enhanced connectivity of the internet. Nearly any everyday object can be connected to the network, reflecting the growing demand for automation and efficiency.
  • 898
  • 04 Sep 2023
Topic Review
Advanced Persistent Thread and Common Systems Behavioral Sources
The rapid proliferation of Internet of Things (IoT) networks in Colombia and various global regions has unquestionably resulted in a significant increase in cyberattacks. This rapid expansion of interconnected devices carries significant implications for individuals, organizations, and governing entities.
  • 897
  • 08 Mar 2024
Topic Review
Leveraging Software-Defined Networking for Named Data Networking
The internet’s future architecture, known as Named Data Networking (NDN), is a creative way to offer content-based services. NDN is more appropriate for content distribution because of its special characteristics, such as naming conventions for packets and methods for in-network caching. Mobility is one of the main study areas for this innovative internet architecture. The software-defined networking (SDN) method, which is employed to provide mobility management in NDN, is one of the feasible strategies. 
  • 895
  • 21 Sep 2023
Topic Review
Energy Efficient Dynamic Symmetric Key in Smart Homes
Smart home security is paramount owing to the private and sensitive information exchanged between the smart devices and the remote users. In this entry, a symmetric key authentication procedures are presented for smart home networks. The proposed protocol leverages on cryptographic primitives such as one-way hashing and bit-wise exclusive-Or operations. Evaluation results show that it is efficient and more secure when compared with other state of the art approaches.
  • 878
  • 04 Jan 2023
Topic Review
IDS Using Feature Extraction with ML in IoT
With the continuous increase in Internet of Things (IoT) device usage, more interest has been shown in internet security, specifically focusing on protecting these vulnerable devices from malicious traffic. Such threats are difficult to distinguish, so an advanced intrusion detection system (IDS) is becoming necessary. Machine learning (ML) is one of the promising techniques as a smart IDS in different areas, including IoT. However, the input to ML models should be extracted from the IoT environment by feature extraction models, which play a significant role in the detection rate and accuracy.
  • 866
  • 22 Nov 2023
Topic Review
Forensic Operations for Recognizing SQLite Content (FORC)
Mobile forensics is crucial in reconstructing various everyday activities accomplished through mobile applications during an investigation. Manual analysis can be tedious, time-consuming, and error-prone. Forensic Operations for Recognizing SQLite Content (FORC) is an automated tool specifically designed for Android to extract Simple Query Language Table Database Lightweight (SQLite) evidence.
  • 864
  • 23 Oct 2023
Topic Review
QUIC Protocol
The QUIC protocol developed in 2012 by Google is an alternative protocol that improves the performance of web-based applications. It makes use of UDP, which allows the connection to enhance the performance of many online applications by replacing the TCP three-way handshake with a single UDP round-trip.
  • 863
  • 17 Nov 2023
  • Page
  • of
  • 5
Academic Video Service