Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
T It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based...
Saved in:
Main Authors: | Al Naeem, Mohammed Abdul Aziz, Abubakar, Adamu, Hafizur Rahman, M. M. |
---|---|
Format: | Article |
Language: | English English English |
Published: |
IEEE
2020
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/84606/1/Published.pdf http://irep.iium.edu.my/84606/7/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_Scopus.pdf http://irep.iium.edu.my/84606/8/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_WOS.pdf http://irep.iium.edu.my/84606/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9241700 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
by: Khan, Fazeel Ahmed, et al.
Published: (2024) -
Challenges in the management of massive intraorbital and hemifacial arteriovenous malformation as causing life-threatening epistaxis
by: Manuel, A.M., et al.
Published: (2017) -
Vein of Galen Malformation
by: REYNU R.,, et al.
Published: (2015) -
Vein of galen malformation.
by: Reynu R,, et al.
Published: (2014) -
Financial impacts of smart meter security and privacy breach
by: Yussof S., et al.
Published: (2023)