Digital Library
Search: "[ keyword: Attacks ]" (6)
-
Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi
Vol. 15, No. 4, pp. 865-889, Aug. 2019
10.3745/JIPS.03.0126
Keywords: Advanced Persistent Threats (APT), Cyber-Attacks, Cyber Kill Chain (CKC), Intelligence Sharing, Knowledge Sharing -
J. Sebastian Terence, Geethanjali Purushothaman
Vol. 15, No. 1, pp. 203-216, Feb. 2019
10.3745/JIPS.03.0110
Keywords: Blackhole Attack, Grayhole attack, Packet Dropping Attacks, Sinkhole attack, Wireless Sensor Network -
Vera Suryani, Selo Sulistyo, Widyawan Widyawan
Vol. 14, No. 6, pp. 1431-1437, Dec. 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic -
Mishal Almazrooie, Azman Samsudin, Manmeet Mahinderjit Singh
Vol. 11, No. 2, pp. 310-324, Jun. 2015
10.3745/JIPS.02.0024
Keywords: Chaos Theory, Cryptography, Differential Attacks, Hash Function, Logistic Map, Salsa20, Stream Cipher -
Amine Dahane, Nasr-Eddine Berrached, Abdelhamid Loukil
Vol. 11, No. 2, pp. 205-228, Jun. 2015
10.3745/JIPS.02.0019
Keywords: clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks -
Lukman Sharif, Munir Ahmed
Vol. 6, No. 2, pp. 177-184, Jun. 2010
10.3745/JIPS.2010.6.2.177
Keywords: Secure routing, Routing Attacks, Routing Protocols, Wireless Sensor Networks (WSN), Wormhole Attack