The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing based services represents a major development in the way of providing IT services. However, the security challenges remains serious threat for such services. Therefore, intrusion detection systems (IDSs) are receiving more attention; this includes IDS methods and applications. This review paper intensively explain characteristics and limitation of the most IDS techniques used in cloud...
Information and communication technology (ICT) plays a significant role in education. Cloud computing is a relatively new technology in ICT. It has drastically changed the way ICT services are used in organisations. In education sector, many education institutions have started to recognise the usefulness and importance of adopting cloud computing technology, and some have started to adopt the technology...
The flooding based Denial-of-service attacks is one of the most common DoS attack targeting the web servers. Availability of the web server under this kind of attacks in danger. This attacks also cause bad influence on the networks bandwidth or in computing resources (CPU, Memory, Storage). Therefore, this paper will focus on studying the effects of (DoS) attacks on CPU power performance and in network...
The distributed control systems (ICSs) implementation within cloud computing environment is a new approach, in information technology arena. Few researches have been taken placed, to deploy the SCADA system within cloud computing environment but failed to provides security during communication. SCADA systems as part of "Distributed control systems (ICS)", implementations within real sectors...
Modbus protocol and IEC 60870-5-104 protocols are widely deployed in critical infrastructure sectors or SCADA systems. With the growing demands of industries, these protocols are also connected over internet using TCP/IP protocol or other transport protocols. Using internet facility, these protocols are vulnerable from several threads/attacks. The current research, detail review the lack of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.