Ara es mostren els items 1-20 de 71

    • A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in named data networking 

      Karami, Amin; Guerrero Zapata, Manel (2015-03-03)
      Article
      Accés obert
      Named Data Networking (NDN) is a promising network architecture being considered as a possible replacement for the current IP-based (host-centric) Internet infrastructure. NDN can overcome the fundamental limitations of ...
    • A methodological approach to policy refinement in policy-based management systems 

      Rubio Loyola, Javier (Universitat Politècnica de Catalunya, 2007-06-29)
      Tesi
      Accés obert
      En la actualidad se están realizando diversos esfuerzos para realizar la visión fu-turista de las redes de telecomunicación autogestionadas. La gestión basada en políticas ha sido reconocida como una herramienta potencial ...
    • A security framework for JXTA-overlay 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Text en actes de congrés
      Accés obert
      At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ...
    • A security-aware approach to JXTA-overlay primitives 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Text en actes de congrés
      Accés obert
      The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability ...
    • A Techno-Economic study of network coding protection schemes 

      Ramirez Almonte, Wilson; Masip Bruin, Xavier; Marín Tordera, Eva; Yannuzzi, Marcelo; Martínez Manzanilla, Anny Gabriela; Sánchez López, Sergio; Siddiqui, Shuaib; López Álvarez, Victor (2014)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The recent advances in optical technologies pave the way to the deployment of high-bandwidth services. As reliability becomes a mandatory requirement for some of these services, network providers must endow their networks ...
    • Adaptive distributed mechanism againts flooding network attacks based on machine learning 

      Berral García, Josep Lluís; Poggi Mastrokalo, Nicolas; Alonso López, Javier; Gavaldà Mestre, Ricard; Torres Viñals, Jordi; Parashar, Manish (ACM Press, NY, 2008)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self- defense for networks and distributed systems. In this paper, we focus on early detection and stopping of ...
    • Amazon Alexa traffic traces 

      Barceló Armada, Rubén; Castell Uroz, Ismael; Barlet Ros, Pere (2022-03)
      Article
      Accés obert
      The number of devices that make up the Internet of Things (IoT) has been increasing every year, including smart speakers such as Amazon Echo devices. These devices have become very popular around the world where users with ...
    • An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings 

      Paillissé Vilanova, Jordi; Rodríguez Natal, Alberto; Ermagan, Vina; Maino, Fabio; Vegoda, Leo; Cabellos Aparicio, Alberto (2018-06-29)
      Report de recerca
      Accés obert
      This document analyzes how blockchain technology can be used to secure the allocation, delegation and binding to topological information of the IP address space. The main outcomes of the analysis are that blockchain is ...
    • An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking 

      Karami, Amin; Guerrero Zapata, Manel (2015-04-07)
      Article
      Accés obert
      Named Data Networking (NDN) is a candidate next-generation Internet architecture designed to overcome the fundamental limitations of the current IP-based Internet, in particular strong security. The ubiquitous in-network ...
    • Anàlisi, disseny i implementació d'un sistema de control d'accés a la xarxa cablejada de la FIB 

      Bellet Chacón, Oriol (Universitat Politècnica de Catalunya, 2011-10)
      Projecte Final de Màster Oficial
      Accés obert
      El projecte consisteix en l'anàlisi disseny i implementació d'un sistema de control d'accés a la xarxa cablejada de la FIB que permeti autenticar usuaris, definir el recursos de xarxa oferts a cada usuari en funció de la ...
    • Architecture support for intrusion detection systems 

      Sreekar Shenoy, Govind (Universitat Politècnica de Catalunya, 2012-10-30)
      Tesi
      Accés obert
      System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates ...
    • Arquitectura de continguts AAA 

      Cabezas, Carlos (2009-06-15)
      Audiovisual
      Accés obert
    • Automating root-cause analysis of network anomalies using frequent itemset mining 

      Paredes Oliva, Ignasi; Dimitropoulos, Xenofontas; Molina, Maurizio; Barlet Ros, Pere; Brauckhoff, Daniela (ACM Press. Association for Computing Machinery, 2010)
      Comunicació de congrés
      Accés obert
      Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mining to automatically extract and summarize ...
    • Can we run our Ethereum nodes at home? 

      Cortes Goicoechea, Mikel; Mohandas Daryanani, Tarun; Muñoz Tapia, José Luis; Bautista Gómez, Leonardo (Institute of Electrical and Electronics Engineers (IEEE), 2024)
      Article
      Accés obert
      Scalability is a common issue among the most used permissionless blockchains, and several approaches have been proposed to solve it. However, tackling scalability while preserving the security and decentralization of the ...
    • Chains of trust in vehicular networks: a secure points of interest dissemination strategy 

      Antolino Rivas, David; Guerrero Zapata, Manel (Elsevier, 2012-08)
      Article
      Accés restringit per política de l'editorial
      This article describes a scheme which to the best of our knowledge is the first one to use user signatures to share information about Points of Interest in Vehicular Ad hoc Networks. In this scheme, users rate restaurants, ...
    • Contribución a la seguridad en servicios multimedia. Aplicación a entornos multicast 

      Pegueroles Vallés, Josep R. (Universitat Politècnica de Catalunya, 2003-11-21)
      Tesi
      Accés obert
      Usually multimedia services can be divided into two different phases: access to the service and content distribution. The first phase usually takes place over reliable transport protocols and unicast connections. The second ...
    • Criptografía y seguridad en comunicaciones 

      Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
      Article
      Accés obert
    • Decentralised Internet infrastructure: Securing inter-domain routing (DEMO) 

      Ferriol Galmés, Miquel; Cabellos Aparicio, Alberto (Institute of Electrical and Electronics Engineers (IEEE), 2021)
      Comunicació de congrés
      Accés obert
      The Border Gateway Protocol (BGP) is the inter-domain routing protocol that glues the Internet. BGP does not incorporate security and instead, it relies on careful configuration and manual filtering to offer some protection. ...
    • Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems 

      Touceda, D.S.; Cámara, J.M.S.; Soriano Ibáñez, Miguel (2012-06)
      Article
      Accés restringit per política de l'editorial
      Several alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ...
    • Demo abstract: Towards IoT service deployments on edge community network microclouds 

      Khan, Amin M.; Freitag, Fèlix; Vlassov, Vladimir; Ha, Phuong Hoai (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Text en actes de congrés
      Accés obert
      Internet of Things (IoT) services for personal devices and smart homes provided by commercial solutions are typically proprietary and closed. These services provide little control to the end users, for instance to take ...