Differentially private self-normalizing neural networks for adversarial robustness in federated learning | 0 | 0.34 | 2022 |
A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets | 0 | 0.34 | 2022 |
Securing RPL Using Network Coding: The Chained Secure Mode (CSM) | 0 | 0.34 | 2022 |
A STRIDE Threat Model for 5G Core Slicing | 0 | 0.34 | 2021 |
Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks | 0 | 0.34 | 2021 |
An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse | 0 | 0.34 | 2021 |
Consolidating Policy Chains Using One Pass Packet Steering in Software Defined Data Centers | 0 | 0.34 | 2021 |
Enhancing Routing Security in IoT: Performance Evaluation of RPL’s Secure Mode Under Attacks | 3 | 0.42 | 2020 |
Introducing Network Coding to RPL: The Chained Secure Mode (CSM) | 1 | 0.34 | 2020 |
Proactive and Dynamic Slice Allocation in Sliced 5G Core Networks | 0 | 0.34 | 2020 |
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs | 0 | 0.34 | 2020 |
DSAF: Dynamic Slice Allocation Framework for 5G Core Network. | 0 | 0.34 | 2019 |
Optimal Slice Allocation in 5G Core Networks. | 0 | 0.34 | 2019 |
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks. | 0 | 0.34 | 2019 |
Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks | 0 | 0.34 | 2019 |
Routing Attacks and Mitigation Methods for RPL-Based Internet of Things | 10 | 0.61 | 2019 |
Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices | 1 | 0.34 | 2019 |
Optimal Slice Allocation in 5G Core Networks | 7 | 0.50 | 2018 |
A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers | 3 | 0.39 | 2018 |
A Review Of Recently Emerging Denial Of Service Threats And Defences In The Transport Layer | 0 | 0.34 | 2018 |
A Discussion on Security Education in Academia | 0 | 0.34 | 2018 |
Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing. | 4 | 0.38 | 2018 |
Threat Modeling in LTE Small Cell Networks | 0 | 0.34 | 2018 |
The Effect Of Buffer Management Strategies On 6lowpan'S Response To Buffer Reservation Attacks | 0 | 0.34 | 2017 |
CPV: Delay-Based Location Verification for the Internet. | 4 | 0.39 | 2017 |
Leveraging inter-controller communication to MitigateDDoS attacks in SDN networks. | 0 | 0.34 | 2017 |
A survey on forensic event reconstruction systems. | 0 | 0.34 | 2017 |
Location Verification of Wireless Internet Clients: Evaluation and Improvements. | 0 | 0.34 | 2017 |
Modeling and Analysis of SDN Control Applications using Vector Spaces. | 0 | 0.34 | 2017 |
An empirical model of packet processing delay of the Open vSwitch | 1 | 0.36 | 2017 |
Accurate Manipulation of Delay-based Internet Geolocation. | 0 | 0.34 | 2017 |
Could Network View Inconsistency Affect Virtualized Network Security Functions? | 0 | 0.34 | 2017 |
IDSaaS in SDN: Intrusion Detection System as a service in software defined networks. | 0 | 0.34 | 2016 |
On the Impact of Network State Collection on the Performance of SDN Applications | 7 | 0.53 | 2016 |
Maintaining an Up-to-date Global Network View in SDN. | 0 | 0.34 | 2016 |
Towards power profiling of Android permissions | 0 | 0.34 | 2015 |
A classification of web browser fingerprinting techniques | 7 | 0.49 | 2015 |
Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying | 6 | 0.47 | 2015 |
A Survey on Botnet Architectures, Detection and Defences. | 0 | 0.34 | 2015 |
Improved SDN responsiveness to UDP flood attacks | 0 | 0.34 | 2015 |
Optimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems | 3 | 0.43 | 2014 |
Centralized Management of Scalable Cyber Foraging Systems. | 3 | 0.42 | 2013 |
A Study of Trojan Propagation in Online Social Networks. | 0 | 0.34 | 2012 |
A Density Mapping Algorithm for Supporting Cyber Foraging Service Networks | 0 | 0.34 | 2012 |
Broadcasting in MANETs Using Multi-Source Random Linear Network Coding. | 0 | 0.34 | 2012 |
Does context influence responses to firewall warnings? | 2 | 0.36 | 2012 |
Enhanced QoS Support in Certified Wireless USB | 0 | 0.34 | 2011 |
A New Perspective on Providing Cloud Computing Security - A Position Paper. | 0 | 0.34 | 2011 |
Adaptive Random Linear Network Coding with Controlled Forwarding for wireless broadcast | 5 | 0.50 | 2010 |
A Behaviour Study of Network-Aware Stealthy Worms | 0 | 0.34 | 2009 |