Zobrazeno 1 - 10
of 214
pro vyhledávání: '"Nevil Brownlee"'
Publikováno v:
Journal of Computer Security. 29:25-50
HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of w
Publikováno v:
International Journal of Information, Communication Technology and Applications. 4:1-10
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within networks. Basically, a NIDS monitors network flows and compares them with a set of pre-defined suspicious patterns. To be effective, different in
Publikováno v:
DSN
Traditional address scanning attacks mainly rely on the naive 'brute forcing' approach, where the entire IPv4 address space is exhaustively searched by enumerating different possibilities. However, such an approach is inefficient for IPv6 due to its
Publikováno v:
ITNAC
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intr
Autor:
Nevil Brownlee, Qinwen Hu
Publikováno v:
International Journal of Future Computer and Communication. 3:341-345
It is tempting to assume that for IPv6, with its 64-bit Interface IDs (IIDs), some existing address scanning attacks have become infeasible. RFC 5157 suggests how Interface IDs could be allocated so as to minimize a site's vulnerability to address sc
Autor:
Nevil Brownlee, Maziar Janbeglou
Publikováno v:
HPCC/SmartCity/DSS
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Pri
Publikováno v:
LCN
In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this pap
Autor:
Nevil Brownlee, Maziar Janbeglou
Publikováno v:
AINA Workshops
The majority of Internet services today are client-serverbased, where the server is often designed to be a centralizedsystem that serves many clients. In this model mostuser credentials and profiles are stored in corporate servers. There have been ma
Publikováno v:
IPCCC
Large-scale scientific installations generate voluminous amounts of data (or big data) every day. These data often need to be transferred using high-speed links (typically with 10 Gb/s or more link capacity) to researchers located around the globe fo
Autor:
Nevil Brownlee
Publikováno v:
IEICE Transactions on Communications. :2190-2198