Threats on computer networks have been increasing rapidly, and irresponsible parties are always trying to exploit vulnerabilities in the network to do various dangerous things. One …
M Hassaoui, M Hanini, S El Kafhali - Journal of Network and Systems …, 2024 - Springer
Abstract Domain Generation Algorithms (DGAs) are often used for generating huge amounts of domain names to maintain command and control between the infected computer and the …
Threats and attacks on computer networks need to be handled properly in the cyber era. Malicious activities can harm the availability of system resources to the company's financial …
Botnet is one type of malware that infects devices to carry out illegal activities controlled by a botmaster. Many previous studies detected botnets as a single activity while botnet activities …
Botnet attacks have become a significant danger in the digital landscape, posing a significant risk to personnel and public. The ability to detect and mitigate botnet attacks is …
MS Hossen, T Ahmad… - 2023 Intelligent Methods …, 2023 - ieeexplore.ieee.org
Cloud computing has revolutionized business operations by facilitating rapid access to numerous resources and services. With this convenience, however, comes the challenge of …
Botnet attacks on computer networks require proper handling because they can have dangerous consequences. Botnets are dynamic and able to evolve quickly. A botnet can …
JK Lee, T Hong, G Lee - Applied Sciences, 2024 - mdpi.com
High-performance computing (HPC) relies heavily on network security, particularly when supercomputing services are provided via public networks. As supercomputer operators, we …
The evolution of technology and the internet has accelerated the pace of communication and information exchange. Despite technological advancements, the significant weakness …