Leveraging in-network real-value computation for home network device recognition | 0 | 0.34 | 2021 |
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking | 3 | 0.36 | 2019 |
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN | 0 | 0.34 | 2019 |
A TOSCA-Oriented Software-Defined Security Approach for Unikernel-Based Protected Clouds | 0 | 0.34 | 2019 |
Unikernel-based approach for software-defined security in cloud infrastructures. | 0 | 0.34 | 2018 |
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures. | 0 | 0.34 | 2018 |
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. | 0 | 0.34 | 2018 |
Towards a security monitoring plane for named data networking and its application against content poisoning attack. | 1 | 0.34 | 2018 |
μNDN: an orchestrated microservice architecture for named data networking | 0 | 0.34 | 2018 |
A Security Monitoring Plane for Named Data Networking Deployment. | 6 | 0.44 | 2018 |
NDN.p4: Programming information-centric data-planes | 6 | 0.52 | 2016 |
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study | 0 | 0.34 | 2016 |
A platform for the analysis and visualization of network flow data of android environments | 4 | 0.44 | 2015 |
An Online Risk Management Strategy for VoIP Enterprise Infrastructures | 3 | 0.39 | 2015 |
Evaluation of the anonymous I2P network's design choices against performance and security | 1 | 0.36 | 2015 |
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery. | 0 | 0.34 | 2015 |
Anomaly traceback using software defined networking | 10 | 0.56 | 2014 |
SONETOR: A social network traffic generator | 1 | 0.37 | 2014 |
Group-Based Characterization for the I2P Anonymous File-Sharing Environment | 0 | 0.34 | 2014 |
Empirical analysis of Android logs using self-organizing maps | 1 | 0.35 | 2014 |
A SAT-based autonomous strategy for security vulnerability management | 4 | 0.44 | 2014 |
Vulnerability Assessment in Autonomic Networks and Services: A Survey | 3 | 0.67 | 2014 |
Outsourcing Mobile Security in the Cloud. | 4 | 0.40 | 2014 |
A Pin is worth a thousand words: Characterization of publications in Pinterest | 3 | 0.37 | 2014 |
Named data aggregation in wireless sensor networks | 4 | 0.43 | 2014 |
Monitoring anonymous P2P file-sharing systems | 0 | 0.34 | 2013 |
A probabilistic cost-efficient approach for mobile security assessment | 2 | 0.40 | 2013 |
MPC: Popularity-based caching strategy for content centric networks | 54 | 1.83 | 2013 |
Efficient distributed monitoring in 6LoWPAN networks. | 1 | 0.40 | 2013 |
Improving present security through the detection of past hidden vulnerable states | 0 | 0.34 | 2013 |
Detection and mitigation of localized attacks in a widely deployed P2P network. | 8 | 0.56 | 2013 |
Routing based roles assignment for monitoring 6LowPAN networks | 0 | 0.34 | 2012 |
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services | 4 | 0.39 | 2012 |
Improving content availability in the i2p anonymous file-sharing environment | 1 | 0.46 | 2012 |
Dynamic exposure control in P2PSIP networks | 3 | 0.40 | 2012 |
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. | 3 | 0.48 | 2012 |
A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks | 5 | 0.60 | 2012 |
Online Estimation of Battery Lifetime for Wireless Sensors Network | 3 | 0.42 | 2012 |
A bird's eye view on the I2P anonymous file-sharing environment | 4 | 0.48 | 2012 |
PTF: Passive Temporal Fingerprinting | 6 | 0.55 | 2011 |
Econometric feedback for runtime risk management in VoIP architectures | 2 | 0.39 | 2011 |
Towards vulnerability prevention in autonomic networks and systems | 0 | 0.34 | 2011 |
Hinky: Defending against Text-Based Message Spam on Smartphones | 3 | 0.39 | 2011 |
When KAD Meets BitTorrent - Building a Stronger P2P Network | 1 | 0.37 | 2011 |
A survey on fraud and service misuse in voice over IP (VoIP) networks | 4 | 0.50 | 2011 |
Supporting vulnerability awareness in autonomic networks and systems with OVAL | 6 | 0.55 | 2011 |
Artemisa: An open-source honeypot back-end to support security in VoIP domains | 7 | 0.49 | 2011 |
YANG-based configuration modeling - The SecSIP IPS case study -. | 0 | 0.34 | 2011 |
BitTorrent's Mainline DHT Security Assessment | 10 | 0.67 | 2011 |
Special Issue On Virtualization | 0 | 0.34 | 2010 |