Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies

K Kaur, A Kaur, Y Gulzar, V Gandhi - Frontiers in Computer Science, 2024 - frontiersin.org
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …

Security Assessment of Industrial Control System Applying Reinforcement Learning

M Ibrahim, R Elhafiz - Processes, 2024 - mdpi.com
Industrial control systems are often used to assist and manage an industrial operation.
These systems' weaknesses in the various hierarchical structures of the system components …

A survey of transmission control protocol variants

LM Machora - World Journal of Advanced Research and Reviews, 2024 - wjarr.com
TCP (Transmission Control Protocol), is a reliable connection oriented end-to-end protocol.
It contains within itself, mechanisms for ensuring reliability by requiring the receiver to …

Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey

T Murkomen - GSC Advanced Research and Reviews, 2024 - gsconlinepress.com
TCP/IP is the backbone of modern network communication, connecting devices across the
world. TCP/IP at its core is a suite of protocols that enables the transmission of data between …

Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions

W Owoko - World Journal of Advanced Engineering Technology …, 2024 - wjaets.com
The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats
from evolving attack vectors targeting its headers. This survey explores emerging trends in …

TCP/IP stack transport layer performance, privacy, and security issues

OO Felix - World Journal of Advanced Engineering Technology …, 2024 - mail.wjaets.com
Transmission Control Protocol/Internet Protocol (TCP/IP) is the backbone of Internet
transmission. The Transport Layer of the TCP/IP stack, which includes TCP (Transmission …

Revisión sistemática sobre los métodos de evaluación de la seguridad en redes 5G

OP Astudillo-Villavicencio, MS Andrade-López… - …, 2024 - investigarmqr.com
Este artículo revisa sistemáticamente los métodos tradicionales de evaluación de la
seguridad en redes 5G, comparando su aplicabilidad y eficacia específica para abordar las …

Survey Understanding Man-in-the-Middle (MITM) Attacks: Techniques, Tools, and Prevention in the Digital Era

J Hussain, I Talib - Journal of Computing and Artificial Intelligence, 2023 - brainetwork.org
Cyber threats are increasing day by day as internet is becoming more and more popular. In
current digital era, online use of banking transactions and other e-commerce activities open …