Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Ludovic Emmanuel Paul Noel Jacquin"'
Autor:
Ioannis Neokosmidis, Dimitris Katsianis, Georgios Gardikis, Ludovic Emmanuel Paul Noel Jacquin, Antonio Pastor
Publikováno v:
2018 European Conference on Networks and Communications (EuCNC)
EuCNC
EuCNC
SHIELD is an EU-funded project, targeting at thedesign and development of a novel cybersecurity framework, withthe aim of which offers security-as-a-Service in an evolved telcoenvironment. The SHIELD framework leverages NFV (NetworkFunctionsVirtualiz
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9a8dd440e2a6c2b5ebc8f5c3e22862b0
Autor:
Eleni Trouva, Antonio Pastor, Anastasios Kourtis, Antonio Lioy, Nikolaos Papadakis, Georgios Gardikis, M. Terranova, Antonios Litke, Bernat Gastón, C. Giustozzi, Ludovic Emmanuel Paul Noel Jacquin, J. Nunez, A. Bartzas, S. Costicoglou, M. Kafetzakis, C. Davila, Ioannis Neokosmidis, Carolina Fernandez, K. Tzoulas, N. Davri, K. Tripolitis, Y. Angelopoulos, Tiago Batista, Dimitris Papadopoulos, Hamza Attak, Dimitris Katsianis, George Xylouris, R. Preto
Publikováno v:
2017 IEEE Conference on Network Softwarization (NetSoft)
NetSoft
NetSoft
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity framework, which offers security-as-a-Service in an evolved telco environment. The SHIELD framework leverages NFV (Network Functions Virtualization) and
Autor:
Dimitris Papadopoulos, Eleni Trouva, Antonis Litke, Ludovic Emmanuel Paul Noel Jacquin, Marco Casassa-Mont, Cristian Dávila, Eleni-Constantina Davri, Hamza Attak, Bernat Gastón, Nikolaos Papadakis, Carolina Fernandez, Georgios Gardikis, Antonio Lioy, Jerónimo Núñez
Publikováno v:
Computer Communications and Networks ISBN: 9783319646527
Guide to Security in SDN and NFV
Guide to Security in SDN and NFV
Organisations are witnessing an unprecedented escalation of cyber-crime attacks and struggle to protect against them. Rethinking security is required to cope with numerous new challenges arising today: the sophistication of new attacks, the increasin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ce1075bc578bde87b4a293eccd77271c
https://doi.org/10.1007/978-3-319-64653-4_8
https://doi.org/10.1007/978-3-319-64653-4_8
Autor:
Ludovic Emmanuel Paul Noel Jacquin, Georgios Gardikis, Y. Angelopoulos, C. Xylouris, Bernat Gastón, M. De Benedictis, Antonio Lioy
Publikováno v:
2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
NFV-SDN
NFV-SDN
This demo showcases some of the capabilities foreseenfor the security infrastructure designed by the H2020SHIELD project. SHIELD exploits NFV for adaptive monitoringof an IT infrastructure and for feeding the data to an analytics engineto detect atta
Publikováno v:
NetSoft
The rise of software-defined networks in recent years has allowed unprecedented agility in network configuration and orchestration. As physical links and configurations become virtualised, this has created many opportunities for dynamic and transpare
Autor:
Marcelo Yannuzzi, Ludovic Emmanuel Paul Noel Jacquin, Francesco Ciaccia, Roberto Sassu, Rene Serral-Gracia, Fulvio Risso, Adrian Shaw, Jarkko Kuusijärvi, D. Montero, Michael Georgiades, Savvas Charalambides, Mario Nemirovsky, Antonio Pastor, Antonio Lioy, Francesca Bosco, Cataldo Basile
Publikováno v:
Montero, D, Yannuzzi, M, Shaw, A, Jacquin, L, Pastor, A, Serral-Gracià, R, Lioy, A, Risso, F, Basile, C, Sassu, R, Nemirovsky, M, Ciaccia, F, Georgiades, M, Charalambides, S, Kuusijärvi, J & Bosco, F 2015, ' Virtualized security at the network edge : a user-centric approach ', IEEE Communications Magazine, vol. 53, no. 4, pp. 176-186 . https://doi.org/10.1109/MCOM.2015.7081092
The current device-centric protection model against security threats has serious limitations. On one hand, the proliferation of user terminals such as smartphones, tablets, notebooks, smart TVs, game consoles, and desktop computers makes it extremely
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::af6c72e64fa4b4341025501890656c6a
https://cris.vtt.fi/en/publications/d1710d70-10f7-4a20-ae0a-bd2c0f89e6ef
https://cris.vtt.fi/en/publications/d1710d70-10f7-4a20-ae0a-bd2c0f89e6ef
Publikováno v:
Cyber Security and Privacy ISBN: 9783319253596
CSP Forum
CSP Forum
SDN and NFV are modern techniques to implement networking infrastructures and can be used also to implement other advanced functionalities, such as the protection architecture designed by the SECURED project. This paper discusses a couple of techniqu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5921ecd754ba59fdb65ec8f4a80976b8
https://doi.org/10.1007/978-3-319-25360-2_10
https://doi.org/10.1007/978-3-319-25360-2_10
Publikováno v:
IEEE Global Communications Conference (GLOBECOM'14)
IEEE Global Communications Conference (GLOBECOM'14), John Donovan (general chair), Dec 2014, Austin, United States
GLOBECOM
IEEE Global Communications Conference (GLOBECOM'14), John Donovan (general chair), Dec 2014, Austin, United States
GLOBECOM
International audience; This work introduces the "Packet Too Big"-"Packet Too Small" ICMP based attack against IPsec gateways. We explain how an attacker having eavesdropping and packet injection capabilities, from the insecure network where he only
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::58845e408b0352714d399bbf72f88787
https://hal.inria.fr/hal-01052994/document
https://hal.inria.fr/hal-01052994/document
Publikováno v:
PASCO '10-4th International Workshop on Parallel and Symbolic Computation
PASCO '10-4th International Workshop on Parallel and Symbolic Computation, Jul 2010, Grenoble, France. pp.Pages 73-79, ⟨10.1145/1837210.1837223⟩
PASCO
PASCO '10-4th International Workshop on Parallel and Symbolic Computation, Jul 2010, Grenoble, France. pp.Pages 73-79, ⟨10.1145/1837210.1837223⟩
PASCO
International audience; In this work we study the feasibility of high-bandwidth, secure communications on generic machines equipped with the latest CPUs and General-Purpose Graphical Processing Units (GPGPU). We first analyze the suitability of curre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4c74c53d3fa7994cbd5067e1cc310b3b
https://hal.science/hal-00493044/file/paper.pdf
https://hal.science/hal-00493044/file/paper.pdf