Monika Roopak, Gui Yun Tian, Jonathon A. Chambers,
... users based on the hyper text transfer protocol, hyper text transfer protocol secure, frame per second (FPS), secure shell, and email ...
Tópico(s): Software-Defined Networks and 5G
2020 - | IET Networks
... common parameter: bitrate. However, because YouTube has adopted hyper text transfer protocol over secure socket layer (HTTPS) as its adaptive video streaming ...
Tópico(s): Advanced Steganography and Watermarking Techniques
2018 - Institute of Electrical and Electronics Engineers | IEEE Access
... browsers leverage Hyper Text Transfer Protocol (HTTP) or Hyper Text Transfer Protocol Secure (HTTPS) to communicate with web servers and provide ...
Tópico(s): Privacy, Security, and Data Protection
2020 - RELX Group (Netherlands) | SSRN Electronic Journal
Sheetal Kalra, Sandeep K. Sood,
... a secure ECC based mutual authentication protocol for secure communication of embedded devices and cloud servers using Hyper Text Transfer Protocol (HTTP) cookies has been proposed. The proposed scheme ...
Tópico(s): Cryptography and Data Security
2015 - Elsevier BV | Pervasive and Mobile Computing
Бобров А.Ф., P. Premchand, A. Govardhan,
... The proposed web crawler is designed to attend Hyper Text Transfer Protocol Secure (HTTPS) websites including the web pages,which requires ...
Tópico(s): Spam and Phishing Detection
2013 - | International Journal of Data Mining & Knowledge Management Process
Tz-Jie Liu, Hsu-Ting Lee, Fan Wu,
... medical decisions. To ensure information security, we employed Hyper Text Transfer Protocol Secure (HTTPS) for secure transmission, which encrypts the transmitted ...
Tópico(s): Mobile Health and mHealth Applications
2023 - Multidisciplinary Digital Publishing Institute | Healthcare
Meihua Xiao, Daolei Cheng, Wei Li, Yanan Li, Xinqian Liu, Yingtian Mei,
... OAuth) 2.0 protocol is excessively dependent on Hyper text transfer protocol over secure socket layer (HTTPS) to transmit data and ignores per-message encryption, and the transmission efficiency of HTTPS is too low to work well under poor network. The improved OAuth 2.0 modified by Hyper text transfer protocol (HTTP), public key system and private key signature ...
Tópico(s): Mobile and Web Applications
2017 - Institution of Engineering and Technology | Chinese Journal of Electronics
Ayan Chatterjee, Martin Gerdes, Pankaj Khatiwada, Andreas Prinz,
... study, we implemented a hybrid security solution to secure the collection and management of personal health data using Spring Framework (SF), Services for Sensitive Data (TSD) as a service platform, and Hyper-Text-Transfer-Protocol (HTTP (H)) security methods. The adopted solution (SFTSDH = ...
Tópico(s): Cloud Data Security Solutions
2022 - Institute of Electrical and Electronics Engineers | IEEE Access
Due to the expansion of Internet traffic and threats in the cloud environment, intrusion detection is becoming more challenging. Attackers may try to exploit various application protocols such as Domain Name System (DNS), Message Queue Telemetry Transport (MQTT), and Hyper Text Transfer Protocol (HTTP). Attack on one or more of these protocols leads to data leakage and security issues. For this purpose, conventional machine learning (ML) methods such as SVM, NN, Fuzzy Logic, and Hidden Markov Models ...
Tópico(s): Internet Traffic Analysis and
2022 - Elsevier BV | Knowledge-Based Systems
Muhammad Dawood, Chunagbai Xiao, Shanshan Tu, Faiz Abdullah Alotaibi, Mrim M. Alnfiai, Muhammad Farhan,
... launch cyber-attacks on computer networks. However, implementing Secure Socket Layer (SSL)-encrypted Hyper Text Transfer Protocol (HTTP) transmission, known as HTTPS, has significantly reduced ...
Tópico(s): Advanced Malware Detection Techniques
2024 - PeerJ, Inc. | PeerJ Computer Science
Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, V. Anil Kumar,
In the current world scenario where everyone is using the Internet, it is becoming a strenuous task to preserve security. Furthermore the world is becoming progressively digital by the passing of each minute.Alarge portion of the Internet is conducted using the Hyper Text Transfer Protocol (HTTP). But in 2015, it underwent a consequential enhancement and was released as HTTP/2. HTTP/2 includes pipelining, response multiplexing, server push and header compression using HPACKbesides the properties ...
Tópico(s): Internet Traffic Analysis and
2018 - | Journal of Cyber Security and Mobility
Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, Vikas Kumar,
In the current world scenario where everyone is using the Internet, it is becoming a strenuous task to preserve security.Furthermore the world is becoming progressively digital by the passing of each minute.A large portion of the Internet is conducted using the Hyper Text Transfer Protocol (HTTP).But in 2015, it underwent a consequential enhancement and was released as HTTP/2.HTTP/2 includes pipelining, response multiplexing, server push and header compression using HPACK besides the properties of ...
Tópico(s): Network Traffic and Congestion Control
2018 - | Journal of Cyber Security and Mobility
... a network is transferred using protocols such as Hyper Text Transfer Protocol, which is very vulnerable. Many types of malicious contents are hidden in packets that are transferred over a network or system, which may can to get it slow, crash or buffer overflow etc. Thus it is very important to secure networks from such types of attacks. There are ...
Tópico(s): Network Traffic and Congestion Control
2014 - | International Journal of Computer Network and Information Security
Dhuha Dheyaa Khudhur, Muayad Sadik Croock,
... and prevent a denial of service (DoS) attack (hyper text transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber- ...
Tópico(s): Smart Grid Security and Resilience
2021 - Institute of Advanced Engineering and Science (IAES) | International Journal of Electrical and Computer Engineering (IJECE)
Distributed Denial of Service (DDOS) attacks are common threats to the Internet. Derived from lower layers, novel application layer based DDoSassaults utilize authentic Hyper Text Transfer Protocol (HTTP) queries for overwhelming resources of victims making them hard to detect. The study suggests a technique for detecting DDoS assaults from traffic flow trace from which Access Matrix (AM) is generated. Because it is multidimensional, Principle Component Analysis (PCA) decreases features utilized in ...
Tópico(s): Network Packet Processing and Optimization
2017 - Asian Research Consortium | Asian Journal of Research in Social Sciences and Humanities
Lakshmi Narayana Thalluri, Jitendra Prasad Ayodhya, Yuva Raju Chava, Bhimeswara Anjaneya Prasad Tati,
... we have designed a web application using HTML (hyper text markup language) programming for creating the web pages with the text and images. We also used the PHP (hypertext processor) that will be embedded in a HTML code and it can support in a web server. Here we used HTTP (hypertext transfer protocol) that provides communication to the World Wide Web. Finally, to make network as secure as possible we have assigned OTP based login ...
Tópico(s): Water Quality Monitoring Technologies
2020 - RELX Group (Netherlands) | SSRN Electronic Journal
... and maximal up-link/down-link bandwidths;•transmission protocols and compatibility with multiple senders/receivers;•data encryption ... recently introduced Inmarsat BGAN (M4) generation uses IP protocol for data transfer and its potential for telematic ... either general or very limited and tele-support protocols must be adapted to this (language, terminology, speed ... telecommunication equipment and the transmission occurs through defined protocols. In an emergency, or when using ad hoc ... new ALS equipment can perform normally in the hyper-gravity, but some mechanical devices, such as Ambu ...
Tópico(s): Spaceflight effects on biology
2006 - Elsevier BV | British Journal of Anaesthesia
Keonwoo Kim, Taek-Young Youn, Nam-Su Jho, Ku-Young Chang,
... Chang (jang1090@etri.re.kr) are with the Hyper-connected Communication Research Laboratory, ETRI, Daejeon, Rep. of ... this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces ... space and network bandwidth. Recently, the need for secure deduplication of encrypted data between the client and ... MLE) [1], which provides encryption schemes to achieve secure deduplication in cloud storage environments. MLE schemes include ... attack, which is the most serious threat to secure deduplication. If a malicious adversary is able to ...
Tópico(s): Security and Verification in Computing
2016 - Electronics and Telecommunications Research Institute | ETRI Journal
Taesang Choi, Tae‐Yeon Kim, Wouter Tavernier, Aki Korvala, Jussi Pajunpää,
... Kim (tykim@etri.re.kr) are with the Hyper-connected Communication Research Laboratory, ETRI, Daejeon, Rep. of ... based on the host identity protocol (HIP) to secure both control and data channels in SDMNs. 3 ... App (MM App), Monitoring App, Access App, and Secure Service Delivery App. The network applications are orchestrated ...
Tópico(s): Advanced MIMO Systems Optimization
2018 - Electronics and Telecommunications Research Institute | ETRI Journal
Khundrakpam Johnson Singh, Tanmay De,
... the features from incoming packets. These features include Hyper Text Transfer Protocol (HTTP) count, the number of ...
Tópico(s): Network Packet Processing and Optimization
2017 - Elsevier BV | Journal of Information Security and Applications
Nour Moustafa, Benjamin Turnbull, Kim‐Kwang Raymond Choo,
... in application protocols, including Domain Name System (DNS), Hyper Text Transfer Protocol (HTTP) and Message Queue Telemetry ...
Tópico(s): Internet Traffic Analysis and
2018 - Institute of Electrical and Electronics Engineers | IEEE Internet of Things Journal
Khundrakpam Johnson Singh, Khelchandra Thongam, Tanmay De,
... given time frame and the unavailability of HTTP (Hyper Text Transfer Protocol) GET acknowledgment bit in the ...
Tópico(s): Advanced Malware Detection Techniques
2018 - Institution of Engineering and Technology | IET Information Security
Modupe Odusami, Sanjay Misra, Emmanuel Adetiba, Olusola Abayomi‐Alli, Robertas Damaševičius, Ravin Ahuja,
... the approach still find it difficult to detect Hyper Text Transfer Protocol (HTTP) based botnet traffic on ...
Tópico(s): Advanced Malware Detection Techniques
2019 - IOP Publishing | Journal of Physics Conference Series
S. Vanitha, P. Balasubramanie,
... attacks on Message Queue Telemetry Transport (MQTT) and Hyper-Text Transfer Protocol (HTTP) protocols. The proposed work ...
Tópico(s): Internet Traffic Analysis and
2022 - Taylor & Francis | Intelligent Automation & Soft Computing
Seongmin Park, Sungmoon Kwon, Youngkwon Park, Dowon Kim, Ilsun You,
... various protocols such as Non-Access Stratum (NAS), Hyper Text Transfer Protocol (HTTP), Packet Forwarding Control Protocol ( ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2022 - Institute of Electrical and Electronics Engineers | IEEE Access
Devesh Shukla, S. P. Singh, Amit Kumar Thakur, Soumya R. Mohanty,
... normalisation factor. The n is exponent used in hyper ellipse equation [27] and is taken as 2. ...
Tópico(s): Power Systems and Renewable Energy
2020 - Institution of Engineering and Technology | IET Renewable Power Generation
... inspection method packet HTTPS or Hypertext Transfer Protocol Secure in Intrusion Prevention System (IPS) device is to ... do in analyzing HTTPS Paket. Hypertext Transfer Protocol Secure or HTTPS is data communication between client and web server in essentially is end to end secure connection. In network security, IPS device function is ... enters and exits to internal network including packet secure connection. HTTPS packet and others secure connection packet are running packet in the network ... This method makes two sections end to end secure connection. The first is secure connection between IPS ...
Tópico(s): Network Security and Intrusion Detection
2019 - IOP Publishing | IOP Conference Series Materials Science and Engineering
Robyn M. O'Connor, David L. DuBois, Lucy Bowes,
... is visible face-to-face, may result in ‘hyper-personal’ relationships (Ensher et al., 2003, p. 277– ...
Tópico(s): Perfectionism, Procrastination, Anxiety Studies
2018 - The Campbell Collaboration | Campbell Systematic Reviews