Computer Network Security

6LoWPAN Compressed DTLS for CoAP

Data Compression / Communication systems / Internet of Things / Protocols / IOT / Computer Network Security / Internet / Computer Network Security / Internet

Unwanted Traffic Control via Global Trust Management

Traffic control / Computer Network Security / Internet

Exploiting temporal locality in network traffic using commodity multi-cores

Automata / Intrusion Detection Systems / Intrusion Detection / Case Study / Pattern Matching / Redundancy / Acceleration / Intrusion Detection System / UAV payloads / Computer Network Security / String Matching / Finite state machines / Network Traffic / Instruction Sets / Finite State Machine / Redundancy / Acceleration / Intrusion Detection System / UAV payloads / Computer Network Security / String Matching / Finite state machines / Network Traffic / Instruction Sets / Finite State Machine

A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs

Management / Access Control / Inconsistency Management / Computer Languages / Firewall / Resource Management / Error Correction / Time Complexity / Authorisation / Anomaly / Computer Network Security / Polynomials / Access Control List / Application Software / Resource Management / Error Correction / Time Complexity / Authorisation / Anomaly / Computer Network Security / Polynomials / Access Control List / Application Software

CADET: Confidential ad-hoc decentralized end-to-end transport

Routing / Topology / Ad Hoc Networks / Protocols / Network Topologies / Computer Network Security / Network Topology / Transport Protocols / Internet / Computer Network Security / Network Topology / Transport Protocols / Internet
Copyright © 2017 DATOSPDF Inc.