Listar por tema "attack"
Mostrando ítems 1-4 de 4
-
Ataques al protocolo de autenticación OPENID CONNECT + OAUTH2
(07/02/2022)El trabajo ha realizado un análisis en profundidad de las metodologías y patrones de ataque a los protocolos de autenticación OPENID Connect con OAUTH2 en entornos de prueba que simulan implementaciones reales, así como ... -
Intelligent Detection and Recovery from Cyberattacks for Small and Medium-Sized Enterprises
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2020)Cyberattacks threaten continuously computer security in companies. These attacks evolve everyday, being more and more sophisticated and robust. In addition, they take advantage of security breaches in organizations and ... -
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ... -
Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer ...