[LIBRO][B] Cybersecurity of industrial systems

JM Flaus - 2019 - books.google.com
How to manage the cybersecurity of industrial systems is a crucial question. To implement
relevant solutions, the industrial manager must have a clear understanding of IT systems, of …

Performance analysis of OSPF and EIGRP convergence through IPsec tunnel using Multi-homing BGP connection

Z Basit, M Tabassum, T Sharma, M Furqan… - Materials Today …, 2022 - Elsevier
Increasingly, networks stability and convergence time are critical parameters in overall
network performance. Therefore, it is essential to compare the routing protocols performance …

Modern Machine Learning and IoT Applications for Personalized Healthcare:: Opportunities and Challenges

P Sriramalakshmi, SP Rajkumar… - … in Healthcare with …, 2022 - api.taylorfrancis.com
Personalized healthcare is a term used to describe the process of recording and analyzing
data about the particular patient's clinical history and risk factors and providing personalized …

CVSS metric-based analysis, classification and assessment of computer network threats and vulnerabilities

VR Kebande, I Kigwana, HS Venter… - … on Advances in Big …, 2018 - ieeexplore.ieee.org
This paper provides a Common Vulnerability Scoring System (CVSS) metric-based
technique for classifying and analysing the prevailing Computer Network Security …

Cybercrime issues in smart cities networks and prevention using ethical hacking

S Perumal, M Tabassum, G Narayana Samy… - Data-Driven Mining …, 2021 - Springer
Today, the need for security and data protection has increased because of the increase in
Internet use. In today's era, all industries have digitally moved their data to cloud platforms …

[PDF][PDF] Ethical hacking and penetrate testing using Kali and metasploit framework

M Tabassum, S Mohanan… - International Journal of …, 2021 - researchgate.net
The need to ensure confidentiality has expanded exponentially with the increase of recent
Internet usage. For users and enterprises, the reliability and accessibility of their networks …

Monosek–A network packet processing system for analysis & detection of tcp xmas attack using pattern analysis

R Banu, T Jyothi, M Amulya, KN Anju… - … and Control Systems …, 2019 - ieeexplore.ieee.org
Identification of an open or closed port is done using several port scanning techniques and
one of them is TCP Xmas scan. In the TCP header, URG, PSH and FIN flags are utilized for …

Automation of active reconnaissance phase: An automated API-based port and vulnerability scanner

M Malkawi, T Özyer, R Alhajj - Proceedings of the 2021 IEEE/ACM …, 2021 - dl.acm.org
The unprecedented growth in technology has increased the importance of the required
information security that is still hard to be reached. Recently, network and web application …

Low-Cost Sky Camera with Centralized Storage Systems

S Boonprasert, K Techakittiroj… - 2024 21st International …, 2024 - ieeexplore.ieee.org
Sky cameras play a pivotal role in very short-term irradiance forecasting. However, the
existing sky camera solutions available in the market are prohibitively expensive. In this …

Fast clustering for massive collections of malicious URLs

R Rentea, C Oprişa - 2021 IEEE 17th International Conference …, 2021 - ieeexplore.ieee.org
A large number of network security attacks use the HTTP protocol and rely on malicious
URLs. Security solutions can filter such URLs using pattern-based rules, but may also trigger …