Mitigating TCP Protocol Misuse With Programmable Data Planes | 0 | 0.34 | 2021 |
Comparative Assessment of Process Mining for Supporting IoT Predictive Security | 0 | 0.34 | 2021 |
Empowering mobile crowdsourcing apps with user privacy control | 0 | 0.34 | 2021 |
Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification | 0 | 0.34 | 2020 |
Detecting a Stealthy Attack in Distributed Control for Microgrids using Machine Learning Algorithms | 0 | 0.34 | 2020 |
Capturing Privacy-preserving User Contexts with IndoorHash | 0 | 0.34 | 2020 |
A Process Mining Tool for Supporting IoT Security. | 0 | 0.34 | 2020 |
Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic | 3 | 0.39 | 2019 |
Testing nearby peer-to-peer mobile apps at large | 0 | 0.34 | 2019 |
Demonstration Of Synchronization Attacks On Distributed And Cooperative Control In Microgrids | 0 | 0.34 | 2019 |
ANDROFLEET: testing WiFi peer-to-peer mobile apps in the large. | 0 | 0.34 | 2017 |
A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks. | 9 | 0.47 | 2017 |
Implementation and Evaluation of a Controller-Based Forwarding Scheme for NDN | 2 | 0.36 | 2017 |
Using the RPL Protocol for Supporting Passive Monitoring in the Internet of Things | 2 | 0.38 | 2016 |
A Taxonomy of Attacks in RPL-based Internet of Things | 20 | 0.74 | 2016 |
A multi-level framework to identify HTTPS services. | 6 | 0.74 | 2016 |
Improving SNI-Based HTTPS Security Monitoring | 0 | 0.34 | 2016 |
Exploring Smartphone Application Usage Logs with Declared Sociological Information | 0 | 0.34 | 2016 |
Detecting version number attacks in RPL-based networks using a distributed monitoring architecture | 1 | 0.37 | 2016 |
Mitigation Of Topological Inconsistency Attacks In Rpl-Based Low-Power Lossy Networks | 10 | 0.52 | 2015 |
Refining smartphone usage analysis by combining crowdsensing and survey | 1 | 0.39 | 2015 |
Evaluation of the anonymous I2P network's design choices against performance and security | 1 | 0.36 | 2015 |
Efficiently bypassing SNI-based HTTPS filtering | 3 | 0.41 | 2015 |
SRSC: SDN-based routing scheme for CCN | 12 | 0.56 | 2015 |
Group-Based Characterization for the I2P Anonymous File-Sharing Environment | 0 | 0.34 | 2014 |
Addressing DODAG inconsistency attacks in RPL networks | 8 | 0.55 | 2014 |
A Study of RPL DODAG Version Attacks. | 11 | 0.65 | 2014 |
Monitoring anonymous P2P file-sharing systems | 0 | 0.34 | 2013 |
Monitoring and security for the internet of things | 4 | 0.49 | 2013 |
Detection and mitigation of localized attacks in a widely deployed P2P network. | 8 | 0.56 | 2013 |
Improving content availability in the i2p anonymous file-sharing environment | 1 | 0.46 | 2012 |
A bird's eye view on the I2P anonymous file-sharing environment | 4 | 0.48 | 2012 |
I2P's usage characterization | 3 | 0.52 | 2012 |
Comparing paedophile activity in different P2P systems | 1 | 0.34 | 2012 |
When KAD Meets BitTorrent - Building a Stronger P2P Network | 1 | 0.37 | 2011 |
BitTorrent's Mainline DHT Security Assessment | 10 | 0.67 | 2011 |
Content pollution quantification in large P2P networks : A measurement study on KAD. | 7 | 0.51 | 2011 |
Formal verification of secure group communication protocols modelled in UML | 3 | 0.40 | 2010 |
Autonomic renumbering in the future internet | 17 | 0.62 | 2010 |
Automated and secure IPv6 configuration in enterprise networks | 1 | 0.37 | 2010 |
Efficient DHT attack mitigation through peers' ID distribution | 2 | 0.40 | 2010 |
Evaluation of Sybil Attacks Protection Schemes in KAD | 14 | 0.71 | 2009 |
Group Key Management in MANETs | 19 | 0.84 | 2008 |
A Distributed and Adaptive Revocation Mechanism for P2P Networks | 5 | 0.47 | 2008 |
Automated verification of a key management architecture for hierarchical group protocols. | 2 | 0.41 | 2007 |
Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique | 7 | 0.53 | 2006 |
Mobility-awareness in group key management protocols within MANETs. | 0 | 0.34 | 2006 |
Efficient clustering for multicast key distribution in MANETs | 7 | 0.60 | 2005 |
An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks | 7 | 0.63 | 2004 |
Gestion efficace de la sécurité des communications de groupe pour le service SSM | 0 | 0.34 | 2004 |