Exploració per tema "Computer networks -- Security measures"
Ara es mostren els items 1-20 de 41
-
A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in named data networking
(2015-03-03)
Article
Accés obertNamed Data Networking (NDN) is a promising network architecture being considered as a possible replacement for the current IP-based (host-centric) Internet infrastructure. NDN can overcome the fundamental limitations of ... -
A security framework for JXTA-overlay
(Institute of Electrical and Electronics Engineers (IEEE), 2009)
Text en actes de congrés
Accés obertAt present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ... -
A security-aware approach to JXTA-overlay primitives
(Institute of Electrical and Electronics Engineers (IEEE), 2009)
Text en actes de congrés
Accés obertThe JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability ... -
Adaptive distributed mechanism againts flooding network attacks based on machine learning
(ACM Press, NY, 2008)
Text en actes de congrés
Accés restringit per política de l'editorialAdaptive techniques based on machine learning and data mining are gaining relevance in self-management and self- defense for networks and distributed systems. In this paper, we focus on early detection and stopping of ... -
Amazon Alexa traffic traces
(2022-03)
Article
Accés obertThe number of devices that make up the Internet of Things (IoT) has been increasing every year, including smart speakers such as Amazon Echo devices. These devices have become very popular around the world where users with ... -
An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings
(2018-06-29)
Report de recerca
Accés obertThis document analyzes how blockchain technology can be used to secure the allocation, delegation and binding to topological information of the IP address space. The main outcomes of the analysis are that blockchain is ... -
An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
(2015-04-07)
Article
Accés obertNamed Data Networking (NDN) is a candidate next-generation Internet architecture designed to overcome the fundamental limitations of the current IP-based Internet, in particular strong security. The ubiquitous in-network ... -
Automating root-cause analysis of network anomalies using frequent itemset mining
(ACM Press. Association for Computing Machinery, 2010)
Comunicació de congrés
Accés obertFinding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mining to automatically extract and summarize ... -
Can we run our Ethereum nodes at home?
(Institute of Electrical and Electronics Engineers (IEEE), 2024)
Article
Accés obertScalability is a common issue among the most used permissionless blockchains, and several approaches have been proposed to solve it. However, tackling scalability while preserving the security and decentralization of the ... -
Chains of trust in vehicular networks: a secure points of interest dissemination strategy
(Elsevier, 2012-08)
Article
Accés restringit per política de l'editorialThis article describes a scheme which to the best of our knowledge is the first one to use user signatures to share information about Points of Interest in Vehicular Ad hoc Networks. In this scheme, users rate restaurants, ... -
Criptografía y seguridad en comunicaciones
(Asociación de Técnicos de Informática, 1995-07)
Article
Accés obert -
Decentralised Internet infrastructure: Securing inter-domain routing (DEMO)
(Institute of Electrical and Electronics Engineers (IEEE), 2021)
Comunicació de congrés
Accés obertThe Border Gateway Protocol (BGP) is the inter-domain routing protocol that glues the Internet. BGP does not incorporate security and instead, it relies on careful configuration and manual filtering to offer some protection. ... -
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems
(2012-06)
Article
Accés restringit per política de l'editorialSeveral alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ... -
Demo abstract: Towards IoT service deployments on edge community network microclouds
(Institute of Electrical and Electronics Engineers (IEEE), 2018)
Text en actes de congrés
Accés obertInternet of Things (IoT) services for personal devices and smart homes provided by commercial solutions are typically proprietary and closed. These services provide little control to the end users, for instance to take ... -
Detecting cryptocurrency miners with NetFlow/IPFIX network measurements
(Institute of Electrical and Electronics Engineers (IEEE), 2019)
Text en actes de congrés
Accés obertIn the last few years, cryptocurrency mining has become more and more important on the Internet activity and nowadays is even having a noticeable impact on the global economy. This has motivated the emergence of a new ... -
Detecting network performance anomalies with contextual anomaly detection
(Institute of Electrical and Electronics Engineers (IEEE), 2017)
Text en actes de congrés
Accés obertNetwork performance anomalies can be defined as abnormal and significant variations in a network's traffic levels. Being able to detect anomalies is critical for both network operators and end users. However, the accurate ... -
Diagnosis of route leaks among autonomous systems in the Internet
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Text en actes de congrés
Accés restringit per política de l'editorialBorder Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was designed without an inherent security mechanism and hence is prone to a number of vulnerabilities which can cause large ... -
Documentar la metodologia que cal dur a terme per a configurar un ordinador com a pasarel·la d'una xarxa interna
(Universitat Politècnica de Catalunya, 2007-06-16)
Projecte/Treball Final de Carrera
Accés obert -
Dynamic reputation-based trust computation in private networks
(2009)
Report de recerca
Accés obertThe use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ... -
Early detection of new web tracking methods across 1.5 million sites
(Elsevier, 2023-10-01)
Article
Accés restringit per política de l'editorialCurrent web tracking practices pose a constant threat to the privacy of Internet users. As a result, the research community has recently proposed different tools to combat well-known tracking methods. However, the early ...