Limpar
28 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Monika Roopak, Gui Yun Tian, Jonathon A. Chambers,

... users based on the hyper text transfer protocol, hyper text transfer protocol secure, frame per second (FPS), secure shell, and email ...

Tópico(s): Software-Defined Networks and 5G

2020 - | IET Networks

Artigo Acesso aberto Revisado por pares

Wubin Pan, Guang Cheng,

... common parameter: bitrate. However, because YouTube has adopted hyper text transfer protocol over secure socket layer (HTTPS) as its adaptive video streaming ...

Tópico(s): Advanced Steganography and Watermarking Techniques

2018 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo

Paul Georg Wagner,

... browsers leverage Hyper Text Transfer Protocol (HTTP) or Hyper Text Transfer Protocol Secure (HTTPS) to communicate with web servers and provide ...

Tópico(s): Privacy, Security, and Data Protection

2020 - RELX Group (Netherlands) | SSRN Electronic Journal

Artigo Revisado por pares

Sheetal Kalra, Sandeep K. Sood,

... a secure ECC based mutual authentication protocol for secure communication of embedded devices and cloud servers using Hyper Text Transfer Protocol (HTTP) cookies has been proposed. The proposed scheme ...

Tópico(s): Cryptography and Data Security

2015 - Elsevier BV | Pervasive and Mobile Computing

Artigo Acesso aberto

Бобров А.Ф., P. Premchand, A. Govardhan,

... The proposed web crawler is designed to attend Hyper Text Transfer Protocol Secure (HTTPS) websites including the web pages,which requires ...

Tópico(s): Spam and Phishing Detection

2013 - | International Journal of Data Mining & Knowledge Management Process

Artigo Acesso aberto Revisado por pares

Tz-Jie Liu, Hsu-Ting Lee, Fan Wu,

... medical decisions. To ensure information security, we employed Hyper Text Transfer Protocol Secure (HTTPS) for secure transmission, which encrypts the transmitted ...

Tópico(s): Mobile Health and mHealth Applications

2023 - Multidisciplinary Digital Publishing Institute | Healthcare

Artigo Revisado por pares

Meihua Xiao, Daolei Cheng, Wei Li, Yanan Li, Xinqian Liu, Yingtian Mei,

... OAuth) 2.0 protocol is excessively dependent on Hyper text transfer protocol over secure socket layer (HTTPS) to transmit data and ignores per-message encryption, and the transmission efficiency of HTTPS is too low to work well under poor network. The improved OAuth 2.0 modified by Hyper text transfer protocol (HTTP), public key system and private key signature ...

Tópico(s): Mobile and Web Applications

2017 - Institution of Engineering and Technology | Chinese Journal of Electronics

Artigo Acesso aberto Revisado por pares

Ayan Chatterjee, Martin Gerdes, Pankaj Khatiwada, Andreas Prinz,

... study, we implemented a hybrid security solution to secure the collection and management of personal health data using Spring Framework (SF), Services for Sensitive Data (TSD) as a service platform, and Hyper-Text-Transfer-Protocol (HTTP (H)) security methods. The adopted solution (SFTSDH = ...

Tópico(s): Cloud Data Security Solutions

2022 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Revisado por pares

Geetha T.V., Deepa A.J.,

Due to the expansion of Internet traffic and threats in the cloud environment, intrusion detection is becoming more challenging. Attackers may try to exploit various application protocols such as Domain Name System (DNS), Message Queue Telemetry Transport (MQTT), and Hyper Text Transfer Protocol (HTTP). Attack on one or more of these protocols leads to data leakage and security issues. For this purpose, conventional machine learning (ML) methods such as SVM, NN, Fuzzy Logic, and Hidden Markov Models ...

Tópico(s): Internet Traffic Analysis and

2022 - Elsevier BV | Knowledge-Based Systems

Artigo Acesso aberto Revisado por pares

Muhammad Dawood, Chunagbai Xiao, Shanshan Tu, Faiz Abdullah Alotaibi, Mrim M. Alnfiai, Muhammad Farhan,

... launch cyber-attacks on computer networks. However, implementing Secure Socket Layer (SSL)-encrypted Hyper Text Transfer Protocol (HTTP) transmission, known as HTTPS, has significantly reduced ...

Tópico(s): Advanced Malware Detection Techniques

2024 - PeerJ, Inc. | PeerJ Computer Science

Artigo Acesso aberto

Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, V. Anil Kumar,

In the current world scenario where everyone is using the Internet, it is becoming a strenuous task to preserve security. Furthermore the world is becoming progressively digital by the passing of each minute.Alarge portion of the Internet is conducted using the Hyper Text Transfer Protocol (HTTP). But in 2015, it underwent a consequential enhancement and was released as HTTP/2. HTTP/2 includes pipelining, response multiplexing, server push and header compression using HPACKbesides the properties ...

Tópico(s): Internet Traffic Analysis and

2018 - | Journal of Cyber Security and Mobility

Artigo Acesso aberto

Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, Vikas Kumar,

In the current world scenario where everyone is using the Internet, it is becoming a strenuous task to preserve security.Furthermore the world is becoming progressively digital by the passing of each minute.A large portion of the Internet is conducted using the Hyper Text Transfer Protocol (HTTP).But in 2015, it underwent a consequential enhancement and was released as HTTP/2.HTTP/2 includes pipelining, response multiplexing, server push and header compression using HPACK besides the properties of ...

Tópico(s): Network Traffic and Congestion Control

2018 - | Journal of Cyber Security and Mobility

Artigo Acesso aberto

Tomar Kuldeep, S. S. Tyagi,

... a network is transferred using protocols such as Hyper Text Transfer Protocol, which is very vulnerable. Many types of malicious contents are hidden in packets that are transferred over a network or system, which may can to get it slow, crash or buffer overflow etc. Thus it is very important to secure networks from such types of attacks. There are ...

Tópico(s): Network Traffic and Congestion Control

2014 - | International Journal of Computer Network and Information Security

Artigo

Dhuha Dheyaa Khudhur, Muayad Sadik Croock,

... and prevent a denial of service (DoS) attack (hyper text transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber- ...

Tópico(s): Smart Grid Security and Resilience

2021 - Institute of Advanced Engineering and Science (IAES) | International Journal of Electrical and Computer Engineering (IJECE)

Artigo

S. Umarani, D. Sharmila,

Distributed Denial of Service (DDOS) attacks are common threats to the Internet. Derived from lower layers, novel application layer based DDoSassaults utilize authentic Hyper Text Transfer Protocol (HTTP) queries for overwhelming resources of victims making them hard to detect. The study suggests a technique for detecting DDoS assaults from traffic flow trace from which Access Matrix (AM) is generated. Because it is multidimensional, Principle Component Analysis (PCA) decreases features utilized in ...

Tópico(s): Network Packet Processing and Optimization

2017 - Asian Research Consortium | Asian Journal of Research in Social Sciences and Humanities

Artigo

Lakshmi Narayana Thalluri, Jitendra Prasad Ayodhya, Yuva Raju Chava, Bhimeswara Anjaneya Prasad Tati,

... we have designed a web application using HTML (hyper text markup language) programming for creating the web pages with the text and images. We also used the PHP (hypertext processor) that will be embedded in a HTML code and it can support in a web server. Here we used HTTP (hypertext transfer protocol) that provides communication to the World Wide Web. Finally, to make network as secure as possible we have assigned OTP based login ...

Tópico(s): Water Quality Monitoring Technologies

2020 - RELX Group (Netherlands) | SSRN Electronic Journal

Revisão Acesso aberto Revisado por pares

Milan Cermack,

... and maximal up-link/down-link bandwidths;•transmission protocols and compatibility with multiple senders/receivers;•data encryption ... recently introduced Inmarsat BGAN (M4) generation uses IP protocol for data transfer and its potential for telematic ... either general or very limited and tele-support protocols must be adapted to this (language, terminology, speed ... telecommunication equipment and the transmission occurs through defined protocols. In an emergency, or when using ad hoc ... new ALS equipment can perform normally in the hyper-gravity, but some mechanical devices, such as Ambu ...

Tópico(s): Spaceflight effects on biology

2006 - Elsevier BV | British Journal of Anaesthesia

Artigo Acesso aberto Revisado por pares

Keonwoo Kim, Taek-Young Youn, Nam-Su Jho, Ku-Young Chang,

... Chang (jang1090@etri.re.kr) are with the Hyper-connected Communication Research Laboratory, ETRI, Daejeon, Rep. of ... this paper, we propose a new client-side secure deduplication method that prevents a poison attack, reduces ... space and network bandwidth. Recently, the need for secure deduplication of encrypted data between the client and ... MLE) [1], which provides encryption schemes to achieve secure deduplication in cloud storage environments. MLE schemes include ... attack, which is the most serious threat to secure deduplication. If a malicious adversary is able to ...

Tópico(s): Security and Verification in Computing

2016 - Electronics and Telecommunications Research Institute | ETRI Journal

Artigo Acesso aberto Revisado por pares

Taesang Choi, Tae‐Yeon Kim, Wouter Tavernier, Aki Korvala, Jussi Pajunpää,

... Kim (tykim@etri.re.kr) are with the Hyper-connected Communication Research Laboratory, ETRI, Daejeon, Rep. of ... based on the host identity protocol (HIP) to secure both control and data channels in SDMNs. 3 ... App (MM App), Monitoring App, Access App, and Secure Service Delivery App. The network applications are orchestrated ...

Tópico(s): Advanced MIMO Systems Optimization

2018 - Electronics and Telecommunications Research Institute | ETRI Journal

Artigo Revisado por pares

Khundrakpam Johnson Singh, Tanmay De,

... the features from incoming packets. These features include Hyper Text Transfer Protocol (HTTP) count, the number of ...

Tópico(s): Network Packet Processing and Optimization

2017 - Elsevier BV | Journal of Information Security and Applications

Artigo

Nour Moustafa, Benjamin Turnbull, Kim‐Kwang Raymond Choo,

... in application protocols, including Domain Name System (DNS), Hyper Text Transfer Protocol (HTTP) and Message Queue Telemetry ...

Tópico(s): Internet Traffic Analysis and

2018 - Institute of Electrical and Electronics Engineers | IEEE Internet of Things Journal

Artigo Revisado por pares

Khundrakpam Johnson Singh, Khelchandra Thongam, Tanmay De,

... given time frame and the unavailability of HTTP (Hyper Text Transfer Protocol) GET acknowledgment bit in the ...

Tópico(s): Advanced Malware Detection Techniques

2018 - Institution of Engineering and Technology | IET Information Security

Artigo Acesso aberto Revisado por pares

Modupe Odusami, Sanjay Misra, Emmanuel Adetiba, Olusola Abayomi‐Alli, Robertas Damaševičius, Ravin Ahuja,

... the approach still find it difficult to detect Hyper Text Transfer Protocol (HTTP) based botnet traffic on ...

Tópico(s): Advanced Malware Detection Techniques

2019 - IOP Publishing | Journal of Physics Conference Series

Artigo Acesso aberto

S. Vanitha, P. Balasubramanie,

... attacks on Message Queue Telemetry Transport (MQTT) and Hyper-Text Transfer Protocol (HTTP) protocols. The proposed work ...

Tópico(s): Internet Traffic Analysis and

2022 - Taylor & Francis | Intelligent Automation & Soft Computing

Artigo Acesso aberto Revisado por pares

Seongmin Park, Sungmoon Kwon, Youngkwon Park, Dowon Kim, Ilsun You,

... various protocols such as Non-Access Stratum (NAS), Hyper Text Transfer Protocol (HTTP), Packet Forwarding Control Protocol ( ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2022 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Devesh Shukla, S. P. Singh, Amit Kumar Thakur, Soumya R. Mohanty,

... normalisation factor. The n is exponent used in hyper ellipse equation [27] and is taken as 2. ...

Tópico(s): Power Systems and Renewable Energy

2020 - Institution of Engineering and Technology | IET Renewable Power Generation

Artigo Acesso aberto Revisado por pares

Angga Friyanto,

... inspection method packet HTTPS or Hypertext Transfer Protocol Secure in Intrusion Prevention System (IPS) device is to ... do in analyzing HTTPS Paket. Hypertext Transfer Protocol Secure or HTTPS is data communication between client and web server in essentially is end to end secure connection. In network security, IPS device function is ... enters and exits to internal network including packet secure connection. HTTPS packet and others secure connection packet are running packet in the network ... This method makes two sections end to end secure connection. The first is secure connection between IPS ...

Tópico(s): Network Security and Intrusion Detection

2019 - IOP Publishing | IOP Conference Series Materials Science and Engineering

Revisão Acesso aberto Revisado por pares

Robyn M. O'Connor, David L. DuBois, Lucy Bowes,

... is visible face-to-face, may result in ‘hyper-personal’ relationships (Ensher et al., 2003, p. 277– ...

Tópico(s): Perfectionism, Procrastination, Anxiety Studies

2018 - The Campbell Collaboration | Campbell Systematic Reviews