Analisis Performa RouterOS MikroTik pada Jaringan Internet

T Rahman, S Sumarna… - Jurnal Inovtek Polbeng …, 2020 - ejournal.polbeng.ac.id
Analisis Performa RouterOS MikroTik pada Jaringan Internet Page 1 JURNAL INOVTEK
POLBENG - SERI INFORMATIKA, VOL. 5, NO. 1 , 2020 ISSN : 2527-9866 178 Analisis …

Improving the IDS performance through early detection approach in local area networks using industrial control systems of honeypot

A Pashaei, ME Akbari, MZ Lighvan… - … on Environment and …, 2020 - ieeexplore.ieee.org
The security of Industrial Control system (ICS) of cybersecurity networks ensures that control
equipment fails and that regular procedures are available at its control facilities and internal …

Intrusion detection with wireless sensor network (WSN) internet of things

A Hendrawan, AF Daru, AM Hirzan - … , Electronic and Computer …, 2021 - jtec.utem.edu.my
The development of network technology is growing rapidly; in the past, all devices were
connected using cables as communication media. But since wireless technology was …

Risk Management in ICS/SCADA Systems to Enhance Security within the Energy Sector

SS Fortunato - 2020 - search.proquest.com
Energy is a valuable resource and is considered a valuable resource as well as an area of
national security concern. Having the ability to protect a nation's energy and power supply is …

NETWORK ANALYSIS AND OPTIMIZATION USING LOAD BALANCING TECHNIQUES

D Mulyana, H Maulana, O Herdiana… - … International Journal of …, 2023 - ojs.unigal.ac.id
Internet use is currently growing rapidly in many aspects of life; education, economy, social
life, politics and culture. The needs and rapid developments in the use of the Internet …

Modeling of HTTP Request with Regular Expression for Slow HTTP DoS Attack Detection

A Tarigan - Pekommas, 2019 - neliti.com
Abstract The availability of Web Service is the most important thing to be guaranteed, but
there are many threats to the Web Service particularly from the internet, one of the famous …

[引用][C] CASO DE ESTUDIO: PROTEGIENDO LA RED CON MIKROTIK DE LOS ATAQUES INTERNOS ARP SPOOFING, MAC FLOODING Y DHCP SPOOFING.

PA Marcillo, DE MFL, AC Benites