Search
Now showing items 1-8 of 8
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)
Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...
Optimization of decentralized payment system for future internet
(Technological University of the Shannon Midlands Midwest, 2022)
With the development of Internet,
the future Internet architecture will
have many features. For example,
the high volume of content together
with new emerging and missioncritical applications, that it will
possibly ...
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)
Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ...
SoK: context and risk aware access control for zero trust systems
(Wiley/Hindawi, 2022-06-30)
Evolving computing technologies such as cloud, edge computing, and the Internet of )ings (IoT) are creating a more complex,
dispersed, and dynamic enterprise operational environment. New security enterprise architectures ...
PIoT: Programmable IoT using Information Centric Networking.
(IEEE, 2016)
The Internet of Things (IoT) places significant
demands on network infrastructure in order to process data
captured by ubiquitous sensor devices. One existing technique to
support this sensor data processing involves ...
Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks
(Elsevier, 2022-04-22)
Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high ...
Pixdoor: a pixel-space backdoor attack on deep learning models
(IEEE, 2021-08-23)
Deep learning algorithms outperform the machine
learning techniques in various fields and are widely deployed
for recognition and classification tasks. However, recent research
focuses on exploring these deep learning ...
Invisible encoded backdoor attack on DNNs using conditional GAN
(IEEE, 2023-02-17)
Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification and vision tasks. However, recent research focuses on exploring these Deep Neural Networks (DNNs) weaknesses ...