An Open Measurement Dataset On The Bitcoin P2p Network | 0 | 0.34 | 2021 |
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users. | 0 | 0.34 | 2019 |
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic | 3 | 0.39 | 2019 |
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. | 0 | 0.34 | 2018 |
μNDN: an orchestrated microservice architecture for named data networking | 0 | 0.34 | 2018 |
Implementation of content poisoning attack detection and reaction in virtualized NDN networks | 1 | 0.34 | 2018 |
Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment | 4 | 0.38 | 2017 |
A multi-level framework to identify HTTPS services. | 6 | 0.74 | 2016 |
A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway. | 0 | 0.34 | 2016 |
Improving SNI-Based HTTPS Security Monitoring | 0 | 0.34 | 2016 |
PIT matching from unregistered remote faces: a critical NDN vulnerability. | 1 | 0.36 | 2016 |
Server-side performance evaluation of NDN. | 2 | 0.39 | 2016 |
Evaluation of the anonymous I2P network's design choices against performance and security | 1 | 0.36 | 2015 |
Efficiently bypassing SNI-based HTTPS filtering | 3 | 0.41 | 2015 |
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment | 0 | 0.34 | 2015 |
CCN traffic optimization for IoT | 16 | 1.04 | 2013 |
A semantic firewall for Content-Centric Networking | 4 | 0.43 | 2013 |
Detection and mitigation of localized attacks in a widely deployed P2P network. | 8 | 0.56 | 2013 |
Security Monitoring for Content-Centric Networking. | 11 | 0.64 | 2012 |
Comparing paedophile activity in different P2P systems | 1 | 0.34 | 2012 |
When KAD Meets BitTorrent - Building a Stronger P2P Network | 1 | 0.37 | 2011 |
BitTorrent's Mainline DHT Security Assessment | 10 | 0.67 | 2011 |
Content pollution quantification in large P2P networks : A measurement study on KAD. | 7 | 0.51 | 2011 |
Efficient DHT attack mitigation through peers' ID distribution | 2 | 0.40 | 2010 |
Evaluation of Sybil Attacks Protection Schemes in KAD | 14 | 0.71 | 2009 |
A Distributed and Adaptive Revocation Mechanism for P2P Networks | 5 | 0.47 | 2008 |