Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Genevieve Bartlett"'
Today’s testbed experimentation is ad-hoc, lengthy and manual.This makes it hard to reuse experiments and reproduce results. Sometimes even authors struggle to reproduce their prior work. Testbeds focus on experiment’s physical design, not the en
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5fd2ab76c1aa5d26d81f269400fa13ab
Publikováno v:
2022 IEEE International Symposium on Measurements & Networking (M&N).
Publikováno v:
Proceedings of the 1st Workshop on Document-grounded Dialogue and Conversational Question Answering (DialDoc 2021).
In this work, we draw parallels between automatically responding to emails for combating social-engineering attacks and document-grounded response generation and lay out the blueprint of our approach. Phishing emails are longer than dialogue utteranc
Publikováno v:
Metro and Data Center Optical Networks and Short-Reach Links III.
In this paper, we demonstrate the integration of a SiP switching platform to improve real-world Distributed Denial of Service (DDoS) defense systems. We demonstrate how DDoS mitigation in the optical domain can be transparent to network and applicati
Autor:
Abhinav Palia, Jelena Mirkovic, Brandon Paulsen, Genevieve Bartlett, Rajat Tandon, Jaydeep Ramani
Publikováno v:
ICNP
Applied Cryptography and Network Security ISBN: 9783030783747
ACNS (2)
Applied Cryptography and Network Security ISBN: 9783030783747
ACNS (2)
Flash Crowd Attacks (FCAs) are DDoS attacks that flood victim services, such as Web servers, with well-formed requests, generated by numerous bots. It is hard to detect and filter such attacks because both legitimate and attack requests look identica
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030129705
TRIDENTCOM
TRIDENTCOM
Recreating real-world network scenarios on testbeds is common in validating security solutions, but modeling networks correctly requires a good deal of expertise in multiple domains. A testbed user must understand the solution being validated, the re
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1aa5cf80882a9dc63072448bc2091dfe
https://doi.org/10.1007/978-3-030-12971-2_9
https://doi.org/10.1007/978-3-030-12971-2_9
Publikováno v:
TMA
Accurate information about address and block usage in the Internet has many applications in planning address allocation, topology studies, and simulations. Prior studies used active probing, sometimes augmented with passive observation, to study macr
Autor:
Jelena Mirkovic, Genevieve Bartlett
Publikováno v:
ICDCS Workshops
In this paper we demonstrate the ease of generating and modifying background traffic in testbed experiments through the traffic generation framework we developed, called LegoTG. LegoTG is a modular framework for composing custom traffic generation. I
Publikováno v:
WISCS@CCS
Access to current application and network data is vital to cybersecurity and networking research. Intrusion detection, steganography, traffic camouflaging, traffic classification and modeling all benefit from real-world data. Such data provides train
Publikováno v:
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
As desktops and servers become more complicated, they employ an increasing amount of automatic, non-user initiated communication. Such communication can be good (OS updates, RSS feed readers, and mail polling), bad (keyloggers, spyware, and botnet co