Articles with "detection protection" as a keyword



Photo from wikipedia

Detection and protection mechanisms against vulnerabilities are needed in blockchain applications

Sign Up to like & get
recommendations!
Published in 2020 at "European Journal of Human Genetics"

DOI: 10.1038/s41431-020-0597-9

Abstract: The paper mentioned about a POW (Proof Of Work) consensus algorithm in the blockchain system. I thought that Dwarna uses the POW algorithm so that they need the strong protection against known seven attacks. POW… read more here.

Keywords: detection protection; protection; consensus; blockchain ... See more keywords
Photo from wikipedia

An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2015.2418434

Abstract: Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the… read more here.

Keywords: detection protection; intrusion detection; system; internal intrusion ... See more keywords