[HTML][HTML] A survey of internet of things and cyber-physical systems: standards, algorithms, applications, security, challenges, and future directions

KT Chui, BB Gupta, J Liu, V Arya, N Nedjah… - Information, 2023 - mdpi.com
The smart city vision has driven the rapid development and advancement of interconnected
technologies using the Internet of Things (IoT) and cyber-physical systems (CPS). In this …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

A survey on cloud security: concepts, types, limitations, and challenges

MA Omer, AA Yazdeen, HS Malallah… - Journal of Applied …, 2022 - jastt.org
Given the world's current situation with the COVID-19 pandemic, several businesses have
recently encouraged remote working from home. A variety of benefits are provided by cloud …

Cybersafe Capabilities and Utilities for Smart Cities

K Kalinaki, NN Thilakarathne, HR Mubarak… - Cybersecurity for Smart …, 2023 - Springer
From the beginning of the 21st century, the entire world suffers from two critical problems:
the growth of the world population and the improvement of life expectancy of people owing …

[HTML][HTML] Detection of HTTP DDoS Attacks Using NFStream and TensorFlow

M Chovanec, M Hasin, M Havrilla, E Chovancová - Applied Sciences, 2023 - mdpi.com
This paper focuses on the implementation of nfstream, an open source network data
analysis tool and machine learning model using the TensorFlow library for HTTP attack …

[HTML][HTML] A Highly Configurable Packet Sniffer Based on Field-Programmable Gate Arrays for Network Security Applications

M Grossi, F Alfonsi, M Prandini, A Gabrielli - Electronics, 2023 - mdpi.com
Web applications and online business transactions have grown tremendously in recent
years. As a result, cyberattacks have become a major threat to the digital services that are …

[HTML][HTML] SD-WAN: Hybrid Edge Cloud Network between Multi-site SDDC

J Wang, M Bewong, L Zheng - Computer Networks, 2024 - Elsevier
This research presents the On-POP-Overlay architecture, a novel contribution to Multi-site
Software-Defined Data Centers (SDDC). Our work contrasts this new architecture with the …

Design and implementation of a distributed firewall management system for improved security

AD Tudosi, A Graur, DG Balan… - 2023 22nd RoEduNet …, 2023 - ieeexplore.ieee.org
Network security is the practice of protecting computer networks and devices from
unauthorized access, attacks, and threats. These threats can come from a variety of sources …

Analysis of effectiveness of iptables on web server from slowloris attack

P Oktivasari, AR Zain, M Agustin… - … of Computer and …, 2022 - ieeexplore.ieee.org
In the application of network technology, a Web Server is needed that can run well, by
providing data services that have the function to accept HTTP or HTTPS requests by …

A Reflection on Typology and Verification Flaws in Consideration of Biocybersecurity/Cyberbiosecurity: Just Another Gap in the Wall

L Potter, K Mossburg, XL Palmer - ECCWS 2023 22nd European …, 2023 - books.google.com
Verification is central to any process in a functional and enduring cyber-secure organization.
This verification is how the validity or accuracy of a state of being is assessed (Schlick, 1936; …