One-Parameter Statistical Methods to Recognize DDoS Attacks

R Hajtmanek, M Kontšek, J Smieško, J Uramová - Symmetry, 2022 - mdpi.com
Within our academic high-speed network infrastructure which is used for connecting all
universities and high schools in our country to the Internet, there are thousands of …

Machine Recognition of DDoS Attacks Using Statistical Parameters

J Smiesko, P Segec, M Kontsek - Mathematics, 2023 - mdpi.com
As part of the research in the recently ended project SANET II, we were trying to create a
new machine-learning system without a teacher. This system was designed to recognize …

Automation of risk management processes

M Sterbak, P Segec, J Jurc - 2021 19th International …, 2021 - ieeexplore.ieee.org
Information technology and computing, such as computers, printers, network devices, cloud
storage, cloud services and, last but not least, application software, are an integral part of …

Network System Healthcheck

D Kafka, J Saxa, P Segeč, A Straka… - 2023 21st International …, 2023 - ieeexplore.ieee.org
With the development of information, communication, and cloud technologies and their
convergence towards global connectivity, questions arise regarding their efficient …

Feasibility of RSS Measurements for Smartphone-Based Indoor Acoustic Localization

V Hromadova, P Brida, R Jarina, J Machaj - International Conference on …, 2022 - Springer
Mobile smartphones' potential for usage in innovative localization systems based on audio
signal processing is limited due to a lack of technical specifications on audio input sensitivity …

Enhancing Security and Privacy Measures in Cloud Environments

K Pelluru - Journal of Engineering and Technology, 2022 - mzjournal.com
This manuscript charts a course through the intricate realm of cloud computing, providing a
comprehensive roadmap for strengthening digital defenses in an age dominated by data …

Cloud Security in Enterprises

D Oneill - 2023 - search.proquest.com
The use of the cloud has grown and continues to expand with enterprises. Enterprises may
not take cloud security as significantly as they should, and as a result, vulnerabilities may …