[PDF][PDF] An energy efficient protocol for the internet of things

A Venckauskas, N Jusas… - Journal of Electrical …, 2015 - intapi.sciendo.com
The Internet of Things (IoT) is a technological revolution that represents the future of
computing and communications. One of the most important challenges of IoT is security …

Lexical analysis for the webshell attacks

LY Deng, DL Lee, YH Chen… - … Symposium on Computer …, 2016 - ieeexplore.ieee.org
In this paper, we proposed a design considering for web application firewall system.
Anyway, the website managing, web technology and hacker technology are vastly different …

Image segmentation with simultaneous illumination and reflectance estimation: An energy minimization approach

C Li, F Li, CY Kao, C Xu - 2009 ieee 12th international …, 2009 - ieeexplore.ieee.org
Spatial intensity variations caused by illumination changes have been a challenge for image
segmentation and many other computer vision tasks. This paper presents a novel method for …

[PDF][PDF] Neural network approach to web application protection

JJ Stephan, SD Mohammed… - International Journal of …, 2015 - academia.edu
The rapid growth of internet has created many services, which have become an integral part
of our day in today life by using Web applications for making reservations, paying bills, and …

Identification of dependency among energy consumption and Wi-Fi protocol security levels within the prototype module for the IoT

A Venckauskas, N Jusas, E Kazanavicius… - Elektronika ir …, 2014 - eejournal.ktu.lt
In this paper, we present an approach to design the prototype module for the Internet of
Things (IoT), which is based on using the Wi-Fi protocol. The aim is to investigate and …

An enhanced CAM architecture to accelerate LZW compression algorithm

R Samanta, RN Mahapatra - … on VLSI Design held jointly with …, 2007 - ieeexplore.ieee.org
This paper presents efficient hardware architecture for Lempel-Ziv-Welch (LZW) data
compression algorithm that can perform both encoding and decoding operations …

[HTML][HTML] Применение машинного обучения в защите веб-приложений

МИ Ожиганова, ЭС Куртаметов - NBI-technologies, 2020 - cyberleninka.ru
Целью данной статьи является исследование особенностей использования машинного
обучения в защите веб-приложений. Были изучены методы защиты веб-приложения и …

Generation of the secret encryption key using the signature of the embedded system

A Venčkauskas, N Jusas, I Mikuckienė… - … technology and control, 2012 - itc.ktu.lt
Program protection, programming code integrity and intellectual property protection are
important problems in embedded systems. Security mechanisms for embedded systems …

Integralus informacijos saugumo valdymo modelis

S Jastiuginas - Informacijos mokslai, 2012 - ceeol.com
Straipsnio tikslas–sukurti moksliškai pagrįstą integralų informacijos saugumo valdymo
modelį, jungiantį informacijos saugumo valdymo ir informacijos vadybos dedamąsias …

[PDF][PDF] ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting attacks

PMD Nagarjun, SA Shaik - International Journal of Electrical and …, 2019 - core.ac.uk
Cross-Site Scripting (XSS) is one of serious web application attack. Web applications are
involved in every activity of human life. JavaScript plays a major role in these web …