Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Robert Lychev"'
Autor:
Bich Vu, J. Darby Mitchell, Katherine Stowell, Mark Rabe, Orton Huang, Robert Lychev, Martine Kalke
Publikováno v:
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM).
Autor:
Michael Vai, David Whelihan, Kyle Denney, Robert Lychev, Jeffery Hughes, Donato Kava, Alice Lee, Nick Evancich, Richard Clark, Dave Lide, Kyung Joon Kwak, Jason Li, Douglas Schafer, Michael Lynch, Kyle Tillotson, Wladimir Tirenin
Publikováno v:
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM).
Autor:
Kyle Denney, Robert Lychev, Donato Kava, Alice Lee, Michael Vai, Nick Evancich, Richard Clark, David Lide, KJ Kwak, Jason Li, Michael Lynch, Kyle Tillotson, Walt Tirenin, Doug Schafer
Publikováno v:
2021 IEEE High Performance Extreme Computing Conference (HPEC).
Publikováno v:
SIGCOMM
As the rollout of secure route origin authentication with the RPKI slowly gains traction among network operators, there is a push to standardize secure path validation for BGP ( i.e., S*BGP: S-BGP, soBGP, BGPSEC, etc.). Origin authentication already
ON JUNE 12, 2015, an incident in the Asia-Pacific region caused network performance problems for hundreds of thousands of Internet destinations, including Facebook and Amazon. 24,37 It was not the result of a natural disaster, a failed transatlantic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d1bd5c891c1e4befb85d93b1056b6f86
https://publica.fraunhofer.de/handle/publica/250091
https://publica.fraunhofer.de/handle/publica/250091
Publikováno v:
IEEE Symposium on Security and Privacy
QUIC is a secure transport protocol developed by Google and implemented in Chrome in 2013, currently representing one of the most promising solutions to decreasing latency while intending to provide security properties similar with TLS. In this work
Autor:
Robert Lychev, Alexandra Boldyreva
Publikováno v:
ACM Conference on Computer and Communications Security
This paper provides the provable-security treatment of path vector routing protocols. We first design a security definition for routing path vector protocols by studying, generalizing, and formalizing numerous known threats. Our model incorporates th
Publikováno v:
PODC
We provide an explanation for the observed stability of today's Internet in the face of common configuration errors and attacks.
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540735465
ATC
ATC
In this paper, we develop an algorithm that may be used as a steppingstone detection tool. Our approach is based on analyzing correlations between the cumulative number of packets sent in outgoing connections and that of the incoming connections. We
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::abe3b85579ef67055a1e69d0b04428f1
https://doi.org/10.1007/978-3-540-73547-2_29
https://doi.org/10.1007/978-3-540-73547-2_29