Limpar
161 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Muhammad Zain ul Abideen, Shahzad Saleem, Madiha Ejaz,

... secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web ... using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection ...

Tópico(s): Advanced Malware Detection Techniques

2019 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Zuhar Musliyana, Teuku Yuliar Arif, Rizal Munadi,

... untuk meningkatkan pengamanan kerentanan tersebut diantaranya yaitu menggunakan Hypertext Transfer Protocol Secure (HTTPS), Secure Hypertext Transfer Protocol (SHTTP) dan Completely Automated Public Turing test to ...

Tópico(s): Advanced Malware Detection Techniques

2016 - Syiah Kuala University | Jurnal Rekayasa Elektrika

Artigo Acesso aberto Revisado por pares

Xun Liu, Junling You, Yulei Wu, Tong Li, Liangxiong Li, Jingqiang Yuan, Jingguo Ge,

... a major platform for sharing information. However, the hypertext transfer protocol secure (HTTPS), which is a crucial web encryption technology ...

Tópico(s): Advanced Malware Detection Techniques

2020 - Elsevier BV | Information Sciences

Artigo Acesso aberto Revisado por pares

Mohammed Abdulridha Hussain, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, Ayad Ibrahim,

... secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the ...

Tópico(s): Advanced Malware Detection Techniques

2017 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto

Axel Arnbak, Hadi Asghari, Michel van Eeten, N. van Eijk,

HTTPS (Hypertext Transfer Protocol Secure) has evolved into the de facto standard for secure Web browsing. Through the certificate-based authentication protocol, ...

Tópico(s): Advanced Authentication

2014 - Association for Computing Machinery | Queue

Artigo Acesso aberto Revisado por pares

Aleksejus Mihalkovich, Eligijus Sakalauskas, Kęstutis Lukšys,

... in secure communication channel creation, e.g., in hypertext transfer protocol secure (https://) and are based on traditional cryptographic primitives ...

Tópico(s): Coding theory and cryptography

2020 - Multidisciplinary Digital Publishing Institute | Symmetry

Artigo Acesso aberto Revisado por pares

Gaofeng He, Bingfeng Xu, Lu Zhang, Haiting Zhu,

... a growing fraction of encrypted traffic such as Hypertext Transfer Protocol Secure. To address this challenge, we have carefully analyzed mobile app traffic (mainly including Domain Name System, Hypertext Transfer Protocol, and encrypted traffic such as Secure Sockets Layer and Transport Layer Security) and observed ...

Tópico(s): Network Security and Intrusion Detection

2018 - Hindawi Publishing Corporation | International Journal of Distributed Sensor Networks

Artigo Acesso aberto Revisado por pares

Matthew Behnke, Nathan Briner, Drake Cullen, Katelynn Schwerdtfeger, Jackson Warren, Ram B. Basnet, Tenzin Doleck,

... and efficient way of detecting malicious DNS over Hypertext Transfer Protocol Secure (HTTPS) traffic, dubbed DoH traffic. Model performance is ...

Tópico(s): Spam and Phishing Detection

2021 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo

Axel Arnbak, N.A.N.M. van Eijk,

Hypertext Transfer Protocol Secure ('HTTPS') has evolved into the de facto standard for secure web browsing. Through the certificate-based ...

Tópico(s): Cybersecurity and Cyber Warfare Studies

2012 - RELX Group (Netherlands) | SSRN Electronic Journal

Artigo Revisado por pares

Swapan Purkait,

... these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the ...

Tópico(s): User Authentication and Security Systems

2015 - Emerald Publishing Limited | Information and Computer Security

Artigo Acesso aberto Revisado por pares

Uwe Engelmann, A. Schroeter, Markus Schwab, Urs Eisenmann, Marcus Vetter, Kathrine M Lorenz, Javier Quiles, Ivo Wolf, Harald Evers, HP Meinzer,

... internet protocols HTTP (HyperText Transfer Protocol) and HTTPS (HyperText Transfer Protocol Secure),and CD-ROMs for off-line communication. These ...

Tópico(s): Distributed and Parallel Computing Systems

1999 - JMIR Publications | Journal of Medical Internet Research

Artigo

Azuwa M.P. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin,

... network architecture; and (2) network services such as Hypertext Transfer Protocol Secure (HTTPS) and virtual private network (VPN). The methodology ...

Tópico(s): Cloud Data Security Solutions

2012 - | International Journal of Cyber-Security and Digital Forensics

Artigo Acesso aberto Revisado por pares

Wenchao Jiang, Pinghao Li, Shuang Wang, Yuan Wu, Meng Xue, Lucila Ohno‐Machado, Xiaoqian Jiang,

... only transfers aggregated local statistics (from participants) through Hypertext Transfer Protocol Secure to a trusted server, where the global model ...

Tópico(s): MRI in cancer diagnosis

2013 - Oxford University Press | Bioinformatics

Artigo Revisado por pares

Nik Thompson, Antony Mullins, Thanavit Chongsutakawewong,

... most basic web security measure, the use of Hypertext Transfer Protocol Secure encryption was only used in half of Australian ...

Tópico(s): Privacy, Security, and Data Protection

2019 - Elsevier BV | Government Information Quarterly

Editorial Acesso aberto Revisado por pares

Thomas T. Joseph, David B. Wax, R. Goldstein, Jiaqiang Huang, Patrick J. McCormick, Matthew A. Levin,

... OR Watch is accessible programmatically with a stateless Hypertext Transfer Protocol Secure (HTTPS)–based API.11 It is readily extensible ...

Tópico(s): Electronic Health Records Systems

2020 - Lippincott Williams & Wilkins | Anesthesia & Analgesia

Artigo Acesso aberto Revisado por pares

Yen-Liang Lee, Hsiu-An Lee, Chien‐Yeh Hsu, Hsin-Hua Kung, Hung‐Wen Chiu,

... Transport Layer Security (TLS) 1.2 (such as HyperText Transfer Protocol Secure (HTTPS) was used for protection in data communication. ...

Tópico(s): Environmental Monitoring and Data Management

2020 - Multidisciplinary Digital Publishing Institute | Sustainability

Artigo Revisado por pares

Mahir Dursun, İsmet Çuhadar,

... an alternative image transmission method based on the secure hypertext transfer protocol (HTTPS) protocol has been developed using Raspberry Pi 3 and Picamera module to ensure a secure data link. to evaluate this method, four alternative ...

Tópico(s): Aerospace Engineering and Applications

2018 - Elsevier BV | Reliability Engineering & System Safety

Artigo Acesso aberto Revisado por pares

Dale Askey, Kenning Arlitsch,

... begin to favor Web sites that use the secure hypertext transfer protocol (HTTPS) in its search results rankings. HTTPS encrypts ...

Tópico(s): Web and Library Services

2014 - Taylor & Francis | Journal of Library Administration

Artigo Acesso aberto Revisado por pares

Mostafa Mohammadpourfard, Mohammad Ali Doostari, M. B. Ghaznavi‐Ghoushchi, Nafiseh Shakiba,

... address and communicate with other network nodes with hypertext transfer protocol secure (HTTPS). Therefore, regardless of utilizing a trusted device ...

Tópico(s): Network Security and Intrusion Detection

2014 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Zuhar Musliyana, Mahendar Dwipayana, Ayu Helinda, Zahrul Maizi,

... overcome the problem, the available solutions are using Hypertext Transfer Protocol Secure (HTTPS) and Secure Hypertext Transfer Protocol (SHTTP). However, some results of related researches show ...

Tópico(s): Network Security and Intrusion Detection

2018 - IOP Publishing | Journal of Physics Conference Series

Artigo Revisado por pares

Åsmund Sand, H. Slinde, Tor A. Fjeldly,

... the underlying network connections involved as long as hypertext transfer protocol over secure sockets layer is supported.

Tópico(s): Sensor Technology and Measurement Systems

2007 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Instrumentation and Measurement

Artigo Acesso aberto Revisado por pares

Abdulrahman Al-Dailami, Chang Ruan, Zhihong Bao, Tao Zhang,

... than 70% of Internet content is transmitted using HyperText Transfer Protocol Secure (HTTPS). However, HTTPS encryption eliminates the advantages of ...

Tópico(s): Peer-to-Peer Network Technologies

2019 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Daniel Haak, Christian Samsel, Johan Gehlen, Stephan Jonas, Thomas M. Deserno,

... binary large objects (BLOBs) are sent via the secure file transfer protocol and hypertext transfer protocol. We applied the close-looped workflow ...

Tópico(s): Biomedical Text Mining and Ontologies

2014 - Springer Science+Business Media | Journal of Digital Imaging

Artigo Revisado por pares

Takahiro Kiuchi, Kazuhiko Ohe, S Kaihara,

... users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL- ...

Tópico(s): Web and Library Services

1998 - Thieme Medical Publishers (Germany) | Methods of Information in Medicine

Artigo

Sujoy Sinha Roy, Utsav Banerjee,

... packets exchanged between the browser and the website. Hypertext Transfer Protocol Secure (HTTPS) is used to establish an encrypted, hence ...

Tópico(s): Chaos-based Image/Signal Encryption

2023 - Institute of Electrical and Electronics Engineers | IEEE Solid-State Circuits Magazine

Artigo

Wei Xu, Linze Hong, Jiufu Zheng, Minghan Li, Yunzhi Hua, Xiaojin Zhao,

... the cloud server in the network layer through hypertext transfer protocol secure (HTTPS) requests, allowing the real-time post of ...

Tópico(s): Non-Invasive Vital Sign Monitoring

2023 - Institute of Electrical and Electronics Engineers | IEEE Internet of Things Journal

Artigo Revisado por pares

Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee,

... refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). ...

Tópico(s): Spam and Phishing Detection

2020 - IOS Press | Journal of Computer Security

Artigo Acesso aberto Revisado por pares

Xi Jia, Meng Zhang,

... activities in networks. With the growing popularity of secure hypertext transfer protocol (HyperText Transfer Protocol over Secure Socket Layer, HTTPS), inspecting the encrypted traffic is ...

Tópico(s): Advanced Malware Detection Techniques

2022 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Revisado por pares

Wei‐Bin Lee, Hsing‐Bai Chen, Shun‐Shyan Chang, Tzung‐Her Chen,

Summary Hypertext transfer protocol (HTTP) cookies are used to store user‐related information sent by a website, and they can be read again later to maintain a link between a user's computer and the website and to remember the user's previous state on the website. In cloud services, cookies are used by service providers to maintain smooth operation for users. As cookies are sent in a public networking environment and saved on users' browsers, two problems are encountered when using cookies: (a) how ...

Tópico(s): Internet Traffic Analysis and

2018 - Wiley | International Journal of Communication Systems