SIA Qadri, K Pandey - International Journal of Advanced Computer …, 2012 - Citeseer
In this paper we provide a security framework for server and client side. In this we provide some prevention methods which will apply for the server side and alert replication is also on …
W Li, W Meng, Y Wang, J Han, J Li - Information Security Practice and …, 2018 - Springer
With the increasing number of Internet-of-Things (IoT) devices, intrusion detection systems (IDSs) have been widely deployed in a distributed or collaborative setting, in which a …
Different security measures have emerged to encounter various Internet security threats, ensuring a certain level of protection against them. However, this does not come without a …
JK Lee, SJ Kim, J Woo, CY Park - KIPS Transactions on …, 2015 - scholar.archive.org
ABSTRACT SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most …
Mobile adhoc network is dynamic in nature and it operates completely in an infrastructure- less environment. It discovers the way routes dynamically to reach the destination. Securing …
K Benton, T Bross - arXiv preprint arXiv:1308.3559, 2013 - arxiv.org
Man in the middle attacks are a significant threat to modern e-commerce and online communications, even when such transactions are protected by TLS. We intend to show that …
S Raheja, G Munjal, J Jangra… - Intelligent Data Analytics …, 2021 - Wiley Online Library
Botnets pose as serious threat and huge loss to organizations. The presence of botnet traffic in any network is a matter of serious concern. They are used for many activities of malicious …
D Al Abri - 2015 IEEE International Conference on Industrial …, 2015 - ieeexplore.ieee.org
Man-in-the-Middle (MITM) attack enables an attacker to monitor the communication exchange between two parties by directing the traffic between them to pass through the …