• Evaluation of a server under DDOS cyber attack 

      Tang, H.; Kolahi, Samad (2022-12-09)
      Principle HTTP DDOS Statistics Impact Testbed settings Monitoring - Wireshark Performance metrics Result - TPS (Transactions per second) Result - response time References
    • Feature-based systematic analysis of advanced persistent threats 

      Miguez, M.; Sarrafpour, Bahman (InTech, 2023-05-22)
      Advanced Persistent Threats (APT) and Targeted Attacks (TA) targeting high-value organizations continue to become more common. These slow (sometimes carried on over the years), fragmented, distributed, seemingly unrelated, ...
    • A new approach for the prevention of sinkhole attack in mobile wireless sensor networks 

      Alomirah, Yasser Abdulrahman (2023)
      RESEARCH QUESTIONS Main research question is: Is it possible to prevent a sinkhole attack on MWSN using a combination of Blowfish and RSA algorithms? Then it was broken down into the following questions: Q1: What would ...
    • Penetration testing & mitigation techniques 

      Latimer, S.; Yasheng, Y.; David, Andrew; Shakiba, Masoud (2022-12-09)
      Penetration testing is a security measure used by many organizations to identify and exploit security vulnerabilities within networks and computer systems, allowing organizations to prevent potential attacks. According to ...
    • Security analysis and evaluation of Bluetooth technology 

      Majumder, I.; Buttar, A.; Bickerton, T.; David, Andrew (2022-12-09)
      Overview - Bluetooth technology Implementation - attack stages: obfuscation, surveillance, fuzzer attack, range extension, sniffing, man-in-the-middle, denial of service (DOS), unauthorised direct data access ...
    • Wardriving, exploitation and mitigation of security-encrypted wireless networks 

      Marwah, H.; Shah, G.; David, Andrew (2022-12-09)
      Problem: how secure the wireless networks are? ; What can we do to make end users savvy about wireless security? Implementation: powerback, GPS dongle, Raspberry Pi 3B+, Alfa adapter Ethical issues Legisla ...