The main purpose of this work is to design and implement a system, that would allow to ban users based on their actions. Currently, cyber attacks have become very common, which leads to a necessity to develop great application and system protections. This project offers a solution, that could decrease a number of cyber attacks, and also prevent banning common users because of the same public IP address as attacker.
The main objective of the different security services and mechanisms today are to provide privacy of...
As a result of technological improvements, computer systems facing not only traditional security att...
The phishing attack is maybe the most customarily announced type of cyber-attack, There are differen...
Cílem této práce je navrhnout a implementovat systém, který má zabránit uživatelům v přístupu do sys...
Abstract— One of the risks of cyber technology is the threat that comes along its benefits: by the v...
International audienceThis paper presents a new methodology using software reflection to prevent, de...
Internet network which is public and global is unsafe, so the security of public Internet-based info...
It is suggested to implement an intrusion prevention system based on the access control mechanism of...
One of the Intrusion Detection System (IDS) methods for preventing web servers from HTTP attacks is ...
Our research problem is that there are a large number of successful network reflection DDoS attacks....
For the last few years, the Internet has experienced tremendous growth. Along with the widespread ev...
We describe a new class of tools for protecting computer systems from security attacks. Their distin...
Computer networks are built to achieve the main goal of communicating with each other . During the t...
Abstract Security is very important especially to maintain the integrity of data for internet servi...
Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via...
The main objective of the different security services and mechanisms today are to provide privacy of...
As a result of technological improvements, computer systems facing not only traditional security att...
The phishing attack is maybe the most customarily announced type of cyber-attack, There are differen...
Cílem této práce je navrhnout a implementovat systém, který má zabránit uživatelům v přístupu do sys...
Abstract— One of the risks of cyber technology is the threat that comes along its benefits: by the v...
International audienceThis paper presents a new methodology using software reflection to prevent, de...
Internet network which is public and global is unsafe, so the security of public Internet-based info...
It is suggested to implement an intrusion prevention system based on the access control mechanism of...
One of the Intrusion Detection System (IDS) methods for preventing web servers from HTTP attacks is ...
Our research problem is that there are a large number of successful network reflection DDoS attacks....
For the last few years, the Internet has experienced tremendous growth. Along with the widespread ev...
We describe a new class of tools for protecting computer systems from security attacks. Their distin...
Computer networks are built to achieve the main goal of communicating with each other . During the t...
Abstract Security is very important especially to maintain the integrity of data for internet servi...
Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via...
The main objective of the different security services and mechanisms today are to provide privacy of...
As a result of technological improvements, computer systems facing not only traditional security att...
The phishing attack is maybe the most customarily announced type of cyber-attack, There are differen...