News
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on ...
Deep learning has proven to be promising for traffic fingerprinting that explores features of packet timing and sizes. Although well-known for automatic feature extraction, it is faced with a gap ...
Md Mojibur Rahman Redoy Akanda, Amanda Lacy, and Nitesh Saxena, Texas A&M University, College Station ...
Wei-Che Kao, Yen-Chia Chen, Yu-Sheng Lin, Yu-Cheng Yang, Chi-Yu Li, and Chun-Ying Huang, National Yang Ming Chiao Tung University ...
Sai Ritvik Tanksalkar, Siddharth Muralee, Datta manikanta sri hari Danduri, Paschal Amusuo, Antonio Bianchi, James C Davis, and Aravind Machiry, Purdue University ...
Each shadow port is associated with a cluster of normal ports. Since its power consumption is the same as that of a normal port, savings can be achieved if atleast two of the normal ports in a cluster ...
Pascal Lafourcade and Dhekra Mahmoud, Université Clermont Auvergne, CNRS, Clermont Auvergne INP, Mines Saint-Etienne, LIMOS, 63000 Clermont-Ferrand, France; Sylvain Ruhault and Abdul Rahman Taleb, ...
Divyanshu Bhardwaj and Sumair Ijaz Hashmi, CISPA Helmholtz Center for Information Security, Saarland University; Katharina Krombholz and Maximilian Golla, CISPA Helmholtz Center for Information ...
Lan Gao, Oscar Chen, Rachel Lee, Nick Feamster, Chenhao Tan, and Marshini Chetty, University of Chicago ...
Wenjun Zhu, Xiaoyu Ji, Xinfeng Li, Qihang Chen, Kun Wang, Xinyu Li, Ruoyan Xu, and Wenyuan Xu, Zhejiang University ...
Rui Wen, Institute of Science Tokyo; Yiyiong Liu, Michael Backes, and Yang Zhang, CISPA Helmholtz Center for Information Security ...
Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, and Yue Zhao, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results