Arşiv logosu
  • Türkçe
  • English
  • Giriş
    Yeni kullanıcı mısınız? Kayıt için tıklayın. Şifrenizi mi unuttunuz?
Arşiv logosu
  • Koleksiyonlar
  • Sistem İçeriği
  • Analiz
  • Talep/Soru
  • Türkçe
  • English
  • Giriş
    Yeni kullanıcı mısınız? Kayıt için tıklayın. Şifrenizi mi unuttunuz?
  1. Ana Sayfa
  2. Yazara Göre Listele

Yazar "Zaim, A. Halim" seçeneğine göre listele

Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
  • Yükleniyor...
    Küçük Resim
    Öğe
    Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective
    (Institute of Electrical and Electronics Engineers Inc., 2023) Gülataş, İbrahim; Kılınç, H. Hakan; Zaim, A. Halim; Aydın, M. Ali
    Developing a secure information processing environment highly depends on securing all the layers and devices in the environment. Edge/Fog computing environments are no exception in this case, and the security of these environments highly depends on securing Internet of Things (IoT) devices which are the most vulnerable devices throughout the environment. The adoption of Edge/Fog computing paradigms by new emerging technologies has stimulated malware development for IoT platforms. Recent attacks initiated by IoT malware show that these attacks have a tremendous impact on compromised systems in terms o the Quality of Service because of the number of infected IoT devices. In the light of these developments, there is an enormous need for efficient solutions. However, defense capabilities against these new malware types are highly constrained by the limited understanding of these new emerging paradigms and the lack of access to malware samples. This study mainly focuses on IoT malware to understand the behaviors of malware in the most vulnerable layer of the Edge/Fog computing environments. Mainly, 64 IoT malware families are identified from 2008 when the first known IoT malware emerged to October 2022. These malware families are systematically characterized by various aspects, including target architecture, target device, delivery methods, attack vectors, persistence techniques, and their evolution from existing malware. During this characterization process, two different investigation frameworks, 'Cyber Kill Chain' and 'Mitre ATT&CK for ICS,' have been adopted in the different investigation layers. This paper aims to bring light to future researches with the presented features of the IoT malware.
  • Küçük Resim Yok
    Öğe
    Optical WDM networks and multicasting
    (CEUR-WS, 2013) Kirci, Pinar; Zaim, A. Halim
    Bandwidth usage increases day by day and the need for new technologies emerges for devoloping the efficiency. Wavelength Division Multiplexing (WDM) is the most spectacular one of these presented network technologies to be able to use optical fibers. In addition to that, multicasting the network traffic also draws attention for ensuring the growing traffic demand. In multicasting, the transmission is performed between the source node and many destination nodes. The packet delivery is not accomplished by flooding or sending the copies of the packets, thus bandwidth capacity is used as ideally as possible. The packet is sent by the source to the network and the network forwards it to the corresponding destinations. Thus, the number of video conferencing, internet based education and stock information distribution like multicast service based applications gradually increase, in time. This type of point to multipoint transmissions need huge amount of bandwidth in the network and also an effective technology that will meet that drawback. To address these issues in this paper, we present a new protocol structure for multicasting with Optical Burst Switching (OBS) on WDM networks. In addition to this, the simulations are performed over unicast and multicast transmissions which are compared on Just-In-Time (JIT) and Just Enough Time (JET) reservation protocols. Copyright © 2013 for the individual papers by the papers' authors.

| İstanbul Ticaret Üniversitesi | Kütüphane | Açık Erişim Politikası | Rehber | OAI-PMH |

Bu site Creative Commons Alıntı-Gayri Ticari-Türetilemez 4.0 Uluslararası Lisansı ile korunmaktadır.


Örnektepe Mah. İmrahor Cad. No: 88/2 Z-42 Beyoğlu, İstanbul, TÜRKİYE
İçerikte herhangi bir hata görürseniz lütfen bize bildirin

DSpace 7.6.1, Powered by İdeal DSpace

DSpace yazılımı telif hakkı © 2002-2025 LYRASIS

  • Çerez Ayarları
  • Gizlilik Politikası
  • Son Kullanıcı Sözleşmesi
  • Geri Bildirim