Zobrazeno 1 - 10
of 1 716
pro vyhledávání: '"Stateful firewall"'
Publikováno v:
IEEE Access, Vol 8, Pp 78029-78043 (2020)
Low-rate distributed denial of service (LDDoS) attacks pose more challenging threats that disrupt network security devices and services. Such type of attacks is difficult to detect and mitigate. In LDDoS attacks, attacker uses low-volume of malicious
Externí odkaz:
https://doaj.org/article/4711e4243f5f4e19b8d24ffe7d12604e
Publikováno v:
IEEE Access, Vol 7, Pp 61596-61609 (2019)
Traditional Distributed Denial of Service (DDoS) attacks usually flood network targets with malicious traffic. Recently, new types of DDoS attacks have emerged and target specifically network security devices, mainly firewalls and intrusion preventio
Externí odkaz:
https://doaj.org/article/21fbfb754d6d445c9e7f90a397914814
Publikováno v:
IEEE Access, Vol 6, Pp 35528-35543 (2018)
Stateful firewalls keep track of the state of network connections. The performance of stateful firewalls depends mainly on the processing of session tables and the mechanism used for packet filtering. This paper presents a stateful session table arch
Externí odkaz:
https://doaj.org/article/52e46a4e74de48f1b821b9912a938de0
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2890-2906
Software-Defined Networking (SDN) provides a programmable framework for multi-tenant cloud network management and orchestration. The end-to-end packet processing induced by virtual network functions (VNFs) like stateless firewall, load balancer, intr
Publikováno v:
IEEE Transactions on Services Computing. 15:2368-2381
Computation partitioning is an important technique to improve the application performance by selectively offloading some computations from the mobile devices to the nearby edge cloud. In a dynamic environment in which the network bandwidth to the edg
Publikováno v:
IEEE Transactions on Network and Service Management. 19:1729-1745
Continuous verification of network security compliance is an accepted need. Especially, the analysis of stateful packet filters plays a central role for network security in practice. But the few existing tools which support the analysis of stateful p
Publikováno v:
IEEE Transactions on Circuits and Systems II: Express Briefs
Processing-in-memory (PIM) seeks to eliminate computation/memory data transfer using devices that support both storage and logic. Stateful logic techniques such as IMPLY, MAGIC and FELIX can perform logic gates within memristive crossbar arrays with
Publikováno v:
IET Information Security, Vol 16, Iss 1, Pp 1-17 (2022)
In some digital signature schemes, the signer needs to maintain a dynamic state while signing messages. These are called stateful signature schemes. Although stateful signature schemes are commonly used as cryptographic primitives, they do not fit th
Autor:
Rafia Afzal, Raja Kumar Murugesan
Publikováno v:
Intelligent Automation & Soft Computing. 31:1825-1841
Autor:
Jiarui Xu, Xinglong Ji, Chao Wang, Wenyu Jiang, Guoyi Yu, Rong Zhao, Yujie Li, Yi Zhan, Jiajun Wu
Publikováno v:
IEEE Transactions on Circuits and Systems I: Regular Papers. 69:309-321
Stateful logic through memristor is a promising technology to build Computing-in-Memory (CIM) systems. However, aging-induced degradation of memristors' threshold voltage imposes a major challenge to the reliability and guardbands estimation of memri