Search

Your search keyword '"Resilience and Elasticity for Security and ScalabiliTy of dynamic networked systems (RESIST)"' showing total 156 results

Search Constraints

Start Over You searched for: Author "Resilience and Elasticity for Security and ScalabiliTy of dynamic networked systems (RESIST)" Remove constraint Author: "Resilience and Elasticity for Security and ScalabiliTy of dynamic networked systems (RESIST)"
156 results on '"Resilience and Elasticity for Security and ScalabiliTy of dynamic networked systems (RESIST)"'

Search Results

1. Avoiding the 1 TB Storage Wall: Leveraging Ethereum's DHT to Reduce Peer Storage Needs

2. Guest Editors Introduction: Special Section on Recent Advances in Network Security Management

3. Benchmarking of lightweight cryptographic algorithms for wireless IoT networks

4. Valorisation de la DHT d'Ethereum pour réduire les besoins de stockage des pairs

5. Efficient Identification of Cloud Gaming Traffic at the Edge

6. Detection methods for security of heterogeneous IoT systems

7. An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions

8. Analyse, valorisation et protection des réseaux pair-à-pair de blockchains publiques

9. CMSec: A Vulnerability Prevention Tool for Supporting Migrations in Cloud Composite Services

10. Assessing Unsupervised Machine Learning solutions for Anomaly Detection in Cloud Gaming Sessions

11. Atténuation des abus de protocole dans les plans de données programmables SDN

12. Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation

13. Évaluation à l'échelle de l'Internet du niveau d'exposition des objets connectés face aux risques de sécurité

14. Caractérisation et diagnostic des applications de cloud gaming sur réseaux mobiles

15. NetREC: Network-wide in-network REal-value Computation

16. Monitoring Network Telescopes and Inferring Anomalous Traffic Through the Prediction of Probing Rates

17. The Hazard Value: A Quantitative Network Connectivity Measure Accounting for Failures

18. Unleashing GPUs for Network Function Virtualization: an open architecture based on Vulkan and Kubernetes

19. An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services

20. Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks

21. Comparative Assessment of Process Mining for Supporting IoT Predictive Security

22. Computer-implemented method for testing the cybersecurity of a target environment

23. Gestion de la Sécurité pour le Cyber-Espace - Du Monitorage Intelligent à la Configuration Automatique

24. Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane

25. Capturing Privacy-Preserving User Contexts with IndoorHash

26. Efficient Rules Management Algorithms in Software Defined Networking

27. Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward

28. An Ensemble Learning-Based Architecture for Security Detection in IoT Infrastructures

29. Inferring Software Composition and Credentials of Embedded Devices from Partial Knowledge

30. An Analysis of Cloud Gaming Platforms Behavior under Different Network Constraints

31. BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services

32. Automated Orchestration of Security Chains Driven by Process Learning

33. Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey

34. Synthesis and feedback on the distribution and parallelization of FMI-CS-based co-simulations with the DACCOSIM platform

35. PESTLE Analysis of Cybersecurity Education

36. Automated mapping of CVE vulnerabilties to MITRE ATT&CK Framework

37. Guest Editors’ Introduction: Special Issue on Latest Developments for Security Management of Networks and Services

38. HSL: a Cyber Security Research Facility for Sensitive Data Experiments

39. Towards Automating Security Enhancement for Cloud Services

40. Leveraging in-network real-value computation for home network device recognition

41. InREC: In-network REal Number Computation

42. Practical security analysis of IoT devices

43. LINT: Accuracy-adaptive and Lightweight In-band Network Telemetry

44. An open measurement dataset on the Bitcoin P2P Network

45. Attack Modelling and Detection in Distributed and Cooperative Controlled Microgrid Systems

46. Using Information Centric Networking in Internet of Things: A Survey

47. Mitigating TCP Protocol Misuse With Programmable Data Planes

48. Decentralized SDN Control Plane for a Distributed Cloud-Edge Infrastructure: A Survey

49. Software-based Analysis of the Security by Design in Embedded Devices

50. A Comprehensive Study of the Bitcoin P2P Network

Catalog

Books, media, physical & digital resources