Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Andrew J. Kalafut"'
Publikováno v:
SIGITE
Vehicle-to-Vehicle (V2V) communication takes place among a wide range of wireless nodes such as cars, trucks, buses, motorcycles. However, V2V systems are vulnerable to Global Positioning Systems (GPS) spoofing attacks, where a malicious vehicle may
Autor:
Brent Nowak, Jared Bush, Andrew J. Kalafut, Yao Li, Samuel Martin, Jessica Parker, Ryan D. Madder, Nicholas Kottenstette, Per Bergman, Stacie VanOosterhout, Adam Rash, Jose Mariano Tan, Abbey Mulder
Publikováno v:
Catheterization and Cardiovascular Interventions. 95:914-919
Objective This study evaluated the impact of network latency on telestenting performance. Background The feasibility of long-distance robotic telestenting was recently demonstrated, yet the impact of network performance on telestenting remains unknow
Publikováno v:
Computer Networks. 116:12-21
DNS amplification has been instrumental in over 34% of high-volume network DDoS attacks, with some floods exceeding 300Gbps. Todays best practices require Internet-wide cooperation and have been unable to prevent these attacks. In this work, we inves
Autor:
Stacie VanOosterhout, Jose Mariano Tan, Nicholas Kottenstette, Per Bergman, Ryan Madder, Li Yao, Jared Bush, Brent Nowak, Paulina Phomvongsa, Jessica Parker, Adam Rash, Andrew J. Kalafut
Publikováno v:
Journal of the American College of Cardiology. 74:B502
Autor:
Craig A. Shue, Andrew J. Kalafut
Publikováno v:
ACM Transactions on Internet Technology. 12:1-17
The Domain Name System (DNS) allows clients to use resolvers, sometimes called caches, to query a set of authoritative servers to translate host names into IP addresses. Prior work has proposed using the interaction between these DNS resolvers and th
Publikováno v:
ACM SIGCOMM Computer Communication Review. 42:72-79
There are many deployed approaches for blocking unwanted traffic, either once it reaches the recipient's network, or closer to its point of origin. One of these schemes is based on the notion of traffic carrying capabilities that grant access to a ne
Publikováno v:
IEEE/ACM Transactions on Networking. 20:220-230
While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) depeerings and network shutdowns. In this paper, we explore whether some AS
Publikováno v:
IEEE/ACM Transactions on Networking. 19:1666-1675
The Domain Name System (DNS) is a critical component of the Internet. It maps domain names to IP addresses and serves as a distributed database for various other applications, including mail, Web, and spam filtering. This paper examines DNS zones in
Publikováno v:
IEEE Security & Privacy Magazine. 7:21-28
Fast flux aims to keep phishing and scam campaigns afloat by provisioning a fraudulent Web site's domain name system records to make the site resolve to numerous, short-lived IP addresses. Although fast flux hurts takedown efforts, it's possible to d
Publikováno v:
Passive and Active Measurement ISBN: 9783319155081
PAM
PAM
Attackers have used DNS amplification in over 34 % of high-volume DDoS attacks, with some floods exceeding 300 Gbps. The best current practices do not help victims during an attack; they are preventative measures that third-party organizations must e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b44f53b3f2d1942fc7cdb7afe2901b44
https://doi.org/10.1007/978-3-319-15509-8_2
https://doi.org/10.1007/978-3-319-15509-8_2