Buscar
Mostrando ítems 1-10 de 55
PRBS/EWMA Based Model for Predicting Burst Attacks (Brute Froce, DoS) in Computer Networks
(Ieee, 2014-01-01)
Burst attacks (e.g. Brute Force, DoS, DDoS, etc) have become a great concern for the today's computer networks, causing millions of losses to the society. Even though the detection of burst attacks is widely investigated, ...
Graph coloring for enforcing password identification against brute force attacks
(Scopus, 2008)
Password Identification or Weak Authentication is one of the weakest points in accessing a system and a suitable point for recurrent attacks of crackers or sniffers. Breakdowns ranging from dictionary brute force attacks ...
ROMPIMIENTO DEL ALGORITMO DES UTILIZANDO FUERZA BRUTA Y PROGRAMACIÓN PARALELA
(2011-11-22)
To hide information from people outside the enterprise has been always important.
When the computers showed up, it was necessary to create new and better protection
methodologies, having as a result the creation of some ...
Evaluación y mitigación de ataques reales a redes ip utilizando tecnologías de virtualización de libre distribución
(2012-12)
IP networks attacks can collapse the continuity of
business services affecting its image and causing economic
losses. This research focuses on the evaluation
of several IP networking real attacks using virtualization
platforms ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
Tangramrine: A novel graphical recognition and cued-recall based password system
(International Journal of Security and Its Applications, 2015-08)
Graphical passwords are an authentication user model that consists of the recall of pictures or graphics signs to gain access to a system. They have been proved to be a secure and reliable alternative to textual passwords; ...
Diseño de una aplicación móvil en Android de alerta y mitigación de ataques informáticos sobre un servidor Linux de comunicación voz IP utilizando comunicación SSH.
(Universidad de Guayaquil. Facultad de Ciencias Matemáticas y Físicas. Carrera de Ingeniería en Sistemas Computacionales., 2022-09)
El tema relacionado el diseño de una aplicación móvil en Android de alerta y mitigación de ataques informáticos basado en el ambiente de un servidor Linux se lo realiza debido a que existe inconvenientes en seguridad ...
A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems
Nowadays, a large amount of data is transmitted over the Internet and in Cyber–Physical Systems (CPS). A significant portion of this data is highly confidential. Bank account details, credit card details, One Time Passwords ...
Implementación de controles a una aplicación web mediante la metodología owasp para el aseguramiento de su seguridad
(2019)
Web applications have been universally accepted by a high number of modern society, in the same way has increased the risks and with it computer attacks, one way to prevent this situation is to detect vulnerabilities that ...