CSpace

浏览/检索结果: 共5条,第1-5条 帮助

已选(0)清除 条数/页:   排序方式:
Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 4, 页码: 3449-3465
作者:  Xu, Zhiwei;  Wang, Xin;  Zhang, Yujun
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
DDoS attacks  persistent attack detection  named date networking  malicious traffic pattern  lightweight  advanced FM sketch  
Misconfiguration-Free Compositional SDN for Cloud Networks 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 3, 页码: 2484-2499
作者:  Pan, Heng;  Li, Zhenyu;  Zhang, Penghao;  Cui, Penglai;  Salamatian, Kave;  Xie, Gaogang
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Law enforcement  Cloud computing  Programming  Pattern matching  Behavioral sciences  Optimization  Monitoring  IaaS cloud networks  misconfiguration checking  policy management  compositional SDN  
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 3, 页码: 1959-1978
作者:  Wu, Chenggang;  Xie, Mengyao;  Wang, Zhe;  Zhang, Yinqian;  Lu, Kangjie;  Zhang, Xiaofeng;  Lai, Yuanming;  Kang, Yan;  Yang, Min;  Li, Tao
收藏  |  浏览/下载:20/0  |  提交时间:2023/12/04
Codes  Hardware  Kernel  Runtime  Security  Registers  Virtualization  Intra-process memory isolation  Intel supervisor-mode access prevention  
Making Information Hiding Effective Again 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:  Wang, Zhe;  Wu, Chenggang;  Zhang, Yinqian;  Tang, Bowen;  Yew, Pen-Chung;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Cheng, Yueqiang;  Shi, Zhiping
收藏  |  浏览/下载:27/0  |  提交时间:2022/12/07
Instruction sets  Registers  Computer crashes  Entropy  Kernel  Security  Probes  Side channel attacks  information hiding  intra-process memory isolation  TLB misses  
Dynamic Packet Forwarding Verification in SDN 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 期号: 6, 页码: 915-929
作者:  Li, Qi;  Zou, Xiaoyue;  Huang, Qun;  Zheng, Jing;  Lee, Patrick P. C.
收藏  |  浏览/下载:53/0  |  提交时间:2020/12/10
Control systems  Cryptography  Protocols  IP networks  Software  Prototypes  Delays  Software-defined networking  attacks  forwarding verification