Exploració per tema "Ordinadors, Xarxes d' -- Mesures de seguretat"
Ara es mostren els items 21-40 de 71
-
Desing and Evaluation of Certificate Revocation Systems
(Universitat Politècnica de Catalunya, 2003-11-26)
Tesi
Accés obertEste trabajo presenta tanto el estado del arte como un análisis de los principales sistemas de revocación de certificados digitales. El hecho de comprender bien el mecanismo de revocación de un certificado es importante ... -
Detecting cryptocurrency miners with NetFlow/IPFIX network measurements
(Institute of Electrical and Electronics Engineers (IEEE), 2019)
Text en actes de congrés
Accés obertIn the last few years, cryptocurrency mining has become more and more important on the Internet activity and nowadays is even having a noticeable impact on the global economy. This has motivated the emergence of a new ... -
Detecting network performance anomalies with contextual anomaly detection
(Institute of Electrical and Electronics Engineers (IEEE), 2017)
Text en actes de congrés
Accés obertNetwork performance anomalies can be defined as abnormal and significant variations in a network's traffic levels. Being able to detect anomalies is critical for both network operators and end users. However, the accurate ... -
Diagnosis of route leaks among autonomous systems in the Internet
(Institute of Electrical and Electronics Engineers (IEEE), 2014)
Text en actes de congrés
Accés restringit per política de l'editorialBorder Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was designed without an inherent security mechanism and hence is prone to a number of vulnerabilities which can cause large ... -
Distributed detection of anomalous internet sessions
(Universitat Politècnica de Catalunya, 2012-11-02)
Tesi
Accés obertFinancial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to ... -
Documentar la metodologia que cal dur a terme per a configurar un ordinador com a pasarel·la d'una xarxa interna
(Universitat Politècnica de Catalunya, 2007-06-16)
Projecte/Treball Final de Carrera
Accés obert -
Dynamic reputation-based trust computation in private networks
(2009)
Report de recerca
Accés obertThe use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ... -
Early detection of new web tracking methods across 1.5 million sites
(Elsevier, 2023-10-01)
Article
Accés restringit per política de l'editorialCurrent web tracking practices pose a constant threat to the privacy of Internet users. As a result, the research community has recently proposed different tools to combat well-known tracking methods. However, the early ... -
Enabling individually entrusted routing security for open and decentralized community networks
(Elsevier, 2018-10)
Article
Accés obertRouting in open and decentralized networks relies on cooperation. However, the participation of unknown nodes and node administrators pursuing heterogeneous trust and security goals is a challenge. Community-mesh networks ... -
Evaluation of a query-obfuscation mechanism for the privacy protection of user profile
(2014-06-30)
Article
Accés obertTraces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ... -
Focusing the study on wireless multihop networks
(2008)
Text en actes de congrés
Accés restringit per política de l'editorialWireless mesh networks, mobile ad-hoc networks and wireless sensor networks are some of the names related to a more general concept that can be described as wireless multihop networks. The topic of the tutorial is motivated ... -
Guia de bones pràctiques per mantenir la privacitat en un món connectat
(Universitat Politècnica de Catalunya, 2018-10)
Treball Final de Grau
Accés obertEl tema que es tractarà en aquest projecte serà la privacitat en un món connectat, concretament quin és el grau de privacitat ofert pels diferents serveis usats dia a dia. L'anàlisi que es farà es basarà en les característiques ... -
Hardware/software mechanisms for protecting an IDS against algorithmic complexity attacks
(Institute of Electrical and Electronics Engineers (IEEE), 2012)
Text en actes de congrés
Accés restringit per política de l'editorialIntrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. An IDS like the popular Snort[17] detects attacks on the network using a database of previous attacks. So ... -
Impacto de las unidades a pie de carretera en las interferencias en redes vehiculares
(2013)
Text en actes de congrés
Accés restringit per política de l'editorialLas redes ad hoc vehiculares (VANETs) han emergido como una tecnolog´ıa clave que posibilita el despliegue diversas aplicaciones. Proporcionar seguridad a los servicios de informaci´on y entretenimiento en estos entornos ... -
Implementation of a programmable Wi-Fi jammer
(Universitat Politècnica de Catalunya, 2017-02-13)
Treball Final de Grau
Accés obertIn our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wireless technology. In spite of all this, security in the Wi-Fi network is considered a big challenge that has not yet ... -
Improving reliability in multi-layer networks with Network Coding Protection
(2014)
Text en actes de congrés
Accés obertA major concern among network providers is to endow their networks with the ability to withstand and recover from failures. In recent years, there is a trend in network research referred to as Network Coding Protection ... -
Improving the performance efficiency of an IDS by exploiting temporal locality in network traffic
(2012)
Text en actes de congrés
Accés restringit per política de l'editorialNetwork traffic has traditionally exhibited temporal locality in the header field of packets. Such locality is intuitive and is a consequence of the semantics of network protocols. However, in contrast, the locality in the ... -
Improving the resilience of an IDS against performance throttling attacks
(Springer, 2012)
Text en actes de congrés
Accés restringit per política de l'editorialIntrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. To be effective against evasion attempts, the IDS must provide tight bounds on performance. Otherwise an ... -
LPsec: a fast and secure cryptographic system for optical connections
(Institute of Electrical and Electronics Engineers (IEEE), 2022-04)
Article
Accés obertHigh capacity and low latency of optical connections are ideal for supporting current and future communication services, including 5G and beyond. Although some of those services are already secured at the packet layer using ... -
Malicious website detection through deep learning algorithms
(Springer Nature, 2022)
Text en actes de congrés
Accés obertTraditional methods that detect malicious websites, such as blacklists, do not update frequently, and they cannot detect new attackers. A system capable of detecting malicious activity using Deep Learning (DL) has been ...