M Vizváry, J Vykopal - Proceedings of 7th International Conference on …, 2013 - is.muni.cz
Abstract The Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a remote access to a computer over a network connection …
Digital security plays an ever-increasing, crucial role in today's information-based society. The variety of threats and attack patterns has dramatically increased with the advent of …
To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based …
E Besharati, M Naderan, E Namjoo - Journal of Ambient Intelligence and …, 2019 - Springer
Cloud computing is an Internet based computing environment, where storage and computing resources are assigned dynamically among users according to their needs, using …
With the increasing utilization of the Internet and its provided services, an increase in cyber- attacks to exploit the information occurs. A technology to store and maintain user's …
H Alkahtani, THH Aldhyani… - Applied Bionics and …, 2020 - Wiley Online Library
Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monitoring of computers and networks is too complicated for network administrators …
A Meryem, BEL Ouahidi - Network Security, 2020 - Elsevier
Recent technologies and innovations have encouraged users to adopt cloud-based architectures. 1, 2 This has reduced IT barriers and provided new capabilities of dynamic …
Machine learning (ML) has been emerging as a viable solution for intrusion detection systems (IDS) to secure IoT devices against different types of attacks. ML based IDS (ML …
E Anthi, L Williams, M Słowińska… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The proliferation in Internet of Things (IoT) devices, which routinely collect sensitive information, is demonstrated by their prominence in our daily lives. Although such devices …