Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Keesook J. Han"'
Autor:
Joao Barros, Fang Zhao, MinJi Kim, Keesook J. Han, Ralf Koetter, Luisa Lima, Muriel Medard, Ton Kalker
Publikováno v:
MIT web domain
Random linear network coding can be used in peer-to- peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzanti
This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud aud
Dynamic network analysis for network security is challenging because it is computationally expensive to extract knowledge structures for quantifying the security levels of dynamic networks. There has been an increased interest in dynamic network anal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4181da7ace0952ffb8bab0a8466ce02d
https://doi.org/10.21236/ada613504
https://doi.org/10.21236/ada613504
Publikováno v:
High Performance Cloud Auditing and Applications
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3dfa11420f2aa98ef767c7a01e670347
https://doi.org/10.1007/978-1-4614-3296-8
https://doi.org/10.1007/978-1-4614-3296-8
Publikováno v:
CNS
Bring Your Own Device (BYOD) is an enterprise information technology (IT) policy that encourages employees to use their own devices to access sensitive corporate data at work through the enterprise IT infrastructure. Many current BYOD security practi
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642392559
DBSec
DBSec
Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in mobile smartphone clouds such as the Android$\textsuperscript\texttrademark$ cloud. Accessing subjects may dynamically change, resources requiring protection
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b857ffa53dab764171a550585691e06a
https://doi.org/10.1007/978-3-642-39256-6_16
https://doi.org/10.1007/978-3-642-39256-6_16
Publikováno v:
MILCOM
The ability to localize Internet hosts is appealing for a range of applications from online advertising to localizing cyber attacks. Recently, measurement-based approaches have been proposed to accurately identify the location of Internet hosts. Thes
Publikováno v:
AINA Workshops
Due to the rapid emergence of Information Technology, cloud computing provides assorted advantages to service providers, developers, organizations, and customers with respect to scalability, flexibility, cost-effectiveness, and availability. However,
Publikováno v:
Data and Applications Security and Privacy XXVI ISBN: 9783642315398
DBSec
DBSec
In today's ever-increasingly digital world, the concept of data privacy has become more and more important. Researchers have developed many privacy-preserving technologies, particularly in the area of data mining and data sharing. These technologies
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9c8f42be1d9d7c67050a33f21ae71bd6
https://doi.org/10.1007/978-3-642-31540-4_11
https://doi.org/10.1007/978-3-642-31540-4_11
Publikováno v:
GLOBECOM
Botnets have become the top threat to Internet security. Botnets generate and transmit huge amounts of malicious traffic for various purposes. In this paper, we propose a dynamic programming based algorithm to calculate a set of appropriate routers f