Mostrando 9 resultados de: 9
Filtros aplicados
Publisher
Information Technology Journal(2)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(2)
Applied Sciences (Switzerland)(1)
Cluster Computing(1)
Internet of Things(1)
An efficient detection and management of false accusation attacks in hierarchical ad-hoc networks
ArticleAbstract: An approach to detect abnormal activities based on reputations created individually by each node isPalabras claves:Ad-hoc network, False accusation, intrusion detection, ReputationAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopus5G-VRSec: Secure video reporting service in 5G enabled vehicular networks
ArticleAbstract: Despite an imminent arrival of the 5G communication technology, there are only a few research worksPalabras claves:Autores:Sang Guun YooFuentes:googlescopusA specification based intrusion detection mechanism for the LEACH protocol
ArticleAbstract: With the improvement of the wireless communication and embedded technology, the application of wirelPalabras claves:Intrusion detection system, Low energy adaptive clustering hierarchy protocol, Misbehavior, Network performance analysis, Network simulation, security, wireless sensor networkAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusDDoS avoidance strategy for service availability
ArticleAbstract: Defending from DDoS attacks have become more difficult because they have evolved in many ways. AbsenPalabras claves:DDoS, security, Service availabilityAutores:Kang S.H., Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusEnhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
Conference ObjectAbstract: Indoor location-based application and services based on Wi-Fi have serious problems in terms of privPalabras claves:Anonymous de-authentication, indoor positioning system, Ips, privacy, WlanAutores:Barriga J.J.A., Juan Carlos Polo, Sang Guun YooFuentes:googlescopusIntegration of AI and IoT Approaches for Evaluating Cybersecurity Risk on Smart City
Book PartAbstract: Cities have adopted the smart city model based on decision-making to maintain their sustainability aPalabras claves:Bayesian network, DIGITAL TWIN, IOT, Risk analysis, smart cityAutores:Iván Ortiz, Luis Tello-Oquendo, Miguel Flores, Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusSecurity Risk Analysis in IoT Systems through Factor Identification over IoT Devices
ArticleAbstract: IoT systems contribute to digital transformation through the development of smart concepts. However,Palabras claves:Attack graphs, IoT security, Risk analysis, Security modelingAutores:Barriga J.J.A., Iván Ortiz-Garcés, Jhonattan J. Barriga A., Roberto Omar Andrade, Sang Guun YooFuentes:googlescopusSpecification-based intrusion detection system for WiBro
Conference ObjectAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wirePalabras claves:information security, intrusion detection, Specification, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun YooFuentes:googlescopus