Ara es mostren els items 21-40 de 71

    • Desing and Evaluation of Certificate Revocation Systems 

      Muñoz Tapia, José Luis (Universitat Politècnica de Catalunya, 2003-11-26)
      Tesi
      Accés obert
      Este trabajo presenta tanto el estado del arte como un análisis de los principales sistemas de revocación de certificados digitales. El hecho de comprender bien el mecanismo de revocación de un certificado es importante ...
    • Detecting cryptocurrency miners with NetFlow/IPFIX network measurements 

      Zayuelas Muñoz, Jordi; Suárez-Varela Maciá, José Rafael; Barlet Ros, Pere (Institute of Electrical and Electronics Engineers (IEEE), 2019)
      Text en actes de congrés
      Accés obert
      In the last few years, cryptocurrency mining has become more and more important on the Internet activity and nowadays is even having a noticeable impact on the global economy. This has motivated the emergence of a new ...
    • Detecting network performance anomalies with contextual anomaly detection 

      Dimopoulos, Giorgos; Barlet Ros, Pere; Dovrolis, Constantine; Leontiadis, Ilias (Institute of Electrical and Electronics Engineers (IEEE), 2017)
      Text en actes de congrés
      Accés obert
      Network performance anomalies can be defined as abnormal and significant variations in a network's traffic levels. Being able to detect anomalies is critical for both network operators and end users. However, the accurate ...
    • Diagnosis of route leaks among autonomous systems in the Internet 

      Siddiqui, Muhammad Shuaib; Montero Banegas, Diego Teodoro; Yannuzzi, Marcelo; Serral Gracià, René; Masip Bruin, Xavier (Institute of Electrical and Electronics Engineers (IEEE), 2014)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Border Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was designed without an inherent security mechanism and hence is prone to a number of vulnerabilities which can cause large ...
    • Distributed detection of anomalous internet sessions 

      García-Cervigon Gutiérrez, Manuel (Universitat Politècnica de Catalunya, 2012-11-02)
      Tesi
      Accés obert
      Financial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to ...
    • Documentar la metodologia que cal dur a terme per a configurar un ordinador com a pasarel·la d'una xarxa interna 

      Manero Moreno, Amador (Universitat Politècnica de Catalunya, 2007-06-16)
      Projecte/Treball Final de Carrera
      Accés obert
    • Dynamic reputation-based trust computation in private networks 

      Nin Guerrero, Jordi; Carminati, Barbara; Ferrari, Elena; Torra i Reventós, Vicenç (2009)
      Report de recerca
      Accés obert
      The use of collaborative networks services in general, and web based social networks (WBSN) services in particular, is today increasing and, therefore, the protection of the resources shared by network participants is ...
    • Early detection of new web tracking methods across 1.5 million sites 

      Castell Uroz, Ismael; Sánchez de Mingo, Óscar; Barlet Ros, Pere (Elsevier, 2023-10-01)
      Article
      Accés restringit per política de l'editorial
      Current web tracking practices pose a constant threat to the privacy of Internet users. As a result, the research community has recently proposed different tools to combat well-known tracking methods. However, the early ...
    • Enabling individually entrusted routing security for open and decentralized community networks 

      Neumann, Axel; Navarro Moldes, Leandro; Cerdà Alabern, Llorenç (Elsevier, 2018-10)
      Article
      Accés obert
      Routing in open and decentralized networks relies on cooperation. However, the participation of unknown nodes and node administrators pursuing heterogeneous trust and security goals is a challenge. Community-mesh networks ...
    • Evaluation of a query-obfuscation mechanism for the privacy protection of user profile 

      Estrada, Jose Antonio; Rodríguez, Ana Fernanda; Parra-Arnau, Javier; Forné Muñoz, Jorge (2014-06-30)
      Article
      Accés obert
      Traces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ...
    • Focusing the study on wireless multihop networks 

      Paradells Aspas, Josep; Gómez Montenegro, Carlos (2008)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Wireless mesh networks, mobile ad-hoc networks and wireless sensor networks are some of the names related to a more general concept that can be described as wireless multihop networks. The topic of the tutorial is motivated ...
    • Guia de bones pràctiques per mantenir la privacitat en un món connectat 

      Kharbouch, Hafid (Universitat Politècnica de Catalunya, 2018-10)
      Treball Final de Grau
      Accés obert
      El tema que es tractarà en aquest projecte serà la privacitat en un món connectat, concretament quin és el grau de privacitat ofert pels diferents serveis usats dia a dia. L'anàlisi que es farà es basarà en les característiques ...
    • Hardware/software mechanisms for protecting an IDS against algorithmic complexity attacks 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (Institute of Electrical and Electronics Engineers (IEEE), 2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. An IDS like the popular Snort[17] detects attacks on the network using a database of previous attacks. So ...
    • Impacto de las unidades a pie de carretera en las interferencias en redes vehiculares 

      Hernández Gañán, Carlos; Reñé Vicente, Sergi; Mata Diaz, Jorge; Alins Delgado, Juan José (2013)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Las redes ad hoc vehiculares (VANETs) han emergido como una tecnolog´ıa clave que posibilita el despliegue diversas aplicaciones. Proporcionar seguridad a los servicios de informaci´on y entretenimiento en estos entornos ...
    • Implementation of a programmable Wi-Fi jammer 

      Ge, Yifei (Universitat Politècnica de Catalunya, 2017-02-13)
      Treball Final de Grau
      Accés obert
      In our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wireless technology. In spite of all this, security in the Wi-Fi network is considered a big challenge that has not yet ...
    • Improving reliability in multi-layer networks with Network Coding Protection 

      Ramirez Almonte, Wilson; Masip Bruin, Xavier; Marín Tordera, Eva; Yannuzzi, Marcelo; Siddiqui, Muhammad Shuaib; Martínez Manzanilla, Anny Gabriela; López Álvarez, Victor (2014)
      Text en actes de congrés
      Accés obert
      A major concern among network providers is to endow their networks with the ability to withstand and recover from failures. In recent years, there is a trend in network research referred to as Network Coding Protection ...
    • Improving the performance efficiency of an IDS by exploiting temporal locality in network traffic 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Network traffic has traditionally exhibited temporal locality in the header field of packets. Such locality is intuitive and is a consequence of the semantics of network protocols. However, in contrast, the locality in the ...
    • Improving the resilience of an IDS against performance throttling attacks 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (Springer, 2012)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. To be effective against evasion attempts, the IDS must provide tight bounds on performance. Otherwise an ...
    • LPsec: a fast and secure cryptographic system for optical connections 

      Iqbal, Masab; Velasco Esteban, Luis Domingo; Costa, Nelson; Napoli, Antonio; Pedro, João; Ruiz Ramírez, Marc (Institute of Electrical and Electronics Engineers (IEEE), 2022-04)
      Article
      Accés obert
      High capacity and low latency of optical connections are ideal for supporting current and future communication services, including 5G and beyond. Although some of those services are already secured at the packet layer using ...
    • Malicious website detection through deep learning algorithms 

      Gutiérrez Escobar, Norma; Otero Calviño, Beatriz; Rodríguez Luna, Eva; Canal Corretger, Ramon (Springer Nature, 2022)
      Text en actes de congrés
      Accés obert
      Traditional methods that detect malicious websites, such as blacklists, do not update frequently, and they cannot detect new attackers. A system capable of detecting malicious activity using Deep Learning (DL) has been ...