Reinforcement And Deep Reinforcement Learning For Wireless Internet Of Things: A Survey | 3 | 0.40 | 2021 |
HSL: a Cyber Security Research Facility for Sensitive Data Experiments | 0 | 0.34 | 2021 |
Leveraging Reinforcement Learning for Adaptive Monitoring of Low-Power IoT Networks | 0 | 0.34 | 2020 |
Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms | 0 | 0.34 | 2020 |
Using Information Centric Networking in Internet of Things: A Survey | 3 | 0.46 | 2019 |
A Tool Suite For The Automated Synthesis Of Security Function Chains | 0 | 0.34 | 2019 |
Automated Factorization of Security Chains in Software-Defined Networks | 0 | 0.34 | 2019 |
Demonstration Of Synchronization Attacks On Distributed And Cooperative Control In Microgrids | 0 | 0.34 | 2019 |
Poster : Minimizing range rules for packet filtering using a double mask representation | 0 | 0.34 | 2019 |
Exploratory Data Analysis of a Network Telescope Traffic and Prediction of Port Probing Rates | 0 | 0.34 | 2018 |
On the Impact of Synchronization Attacks on Distributed and Cooperative Control in Microgrid Systems | 1 | 0.37 | 2018 |
Synaptic: A formal checker for SDN-based security policies. | 0 | 0.34 | 2018 |
Towards a management plane for smart contracts: Ethereum case study. | 0 | 0.34 | 2018 |
Generation of SDN policies for protecting android environments based on automata learning. | 0 | 0.34 | 2018 |
Rule-Based Synthesis of Chains of Security Functions for Software-Defined Networks | 0 | 0.34 | 2018 |
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment. | 2 | 0.38 | 2017 |
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study | 0 | 0.34 | 2016 |
Extracting Markov chain models from protocol execution traces for end to end delay evaluation in wireless sensor networks | 2 | 0.35 | 2015 |
A platform for the analysis and visualization of network flow data of android environments | 4 | 0.44 | 2015 |
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment | 0 | 0.34 | 2015 |
Towards cloud-based compositions of security functions for mobile devices | 2 | 0.43 | 2015 |
Behavioral and dynamic security functions chaining for Android devices | 2 | 0.45 | 2015 |
Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use Case | 5 | 0.57 | 2014 |
Outsourcing Mobile Security in the Cloud. | 4 | 0.40 | 2014 |
Towards performance analysis of wireless sensor networks using Process Mining Techniques | 2 | 0.44 | 2014 |
Named data aggregation in wireless sensor networks | 4 | 0.43 | 2014 |
Measurement-based Analysis of the Effect of Duty Cycle in IEEE 802.15.4 MAC Performance | 2 | 0.38 | 2013 |
Efficient distributed monitoring in 6LoWPAN networks. | 1 | 0.40 | 2013 |
Routing based roles assignment for monitoring 6LowPAN networks | 0 | 0.34 | 2012 |
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services | 4 | 0.39 | 2012 |
Combining Analytical and Simulation Approaches for Estimating End-to-End Delay in Multi-hop Wireless Networks | 1 | 0.35 | 2012 |
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks | 5 | 0.60 | 2012 |
Hinky: Defending against Text-Based Message Spam on Smartphones | 3 | 0.39 | 2011 |
YANG-based configuration modeling - The SecSIP IPS case study -. | 0 | 0.34 | 2011 |
VeTo: An exploit prevention language from known vulnerabilities in SIP services | 5 | 0.69 | 2010 |
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits | 3 | 0.50 | 2009 |
SecSip: a stateful firewall for SIP-based networks | 3 | 0.39 | 2009 |
Performance of network and service monitoring frameworks | 3 | 0.78 | 2009 |
Survey of SNMP performance analysis studies | 14 | 1.06 | 2009 |
Modeling and Performance Evaluation of the Network and Service Management Plane | 0 | 0.34 | 2007 |
On the Impact of Management Instrumentation Models on Web Server Performance: A JMX Case Study | 2 | 0.46 | 2007 |
On delays in management frameworks: metrics, models and analysis | 4 | 0.52 | 2006 |
On the impact of management on the performance of a managed system: a JMX-Based management case study | 6 | 0.69 | 2005 |