A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
2021
Applied Sciences
Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis ...
In addition, we have discussed the state-of-the-art methods in TLS-encrypted NTA for each component of a machine learning pipeline, typically used in the state-of-the-art methods. ...
In Proceedings of the 31st USENIX Security Symposium (USENIX Security), Boston, MA, USA, 10–12 August 2022. ...
doi:10.3390/app12010155
fatcat:kdkvmdkbareb7cxgy7er7ncday
ВОПРОСЫ БЕЗОПАСНОСТИ ПРИ ОРГАНИЗАЦИИ ЗАЩИТЫ СИСТЕМЫ ЭЛЕКТРОННЫХ ПЛАТЕЖЕЙ
2009
Bezopasnostʹ Informacionnyh Tehnologij
This article views main questions of payment systems security, including two aspects: possible attacks on users and security vulnerability of systems architecture. ...
In the article was performed an analysis of delays in a processing of users requests on different levels such as application servers and database in the case of high load traffic. ...
October 2007. 10. Cui W., Kannan J., Wang H. J. Discoverer: Automatic Protocol Reverse Engineering from Network Traces // Proceedings of the 16th USENIX Security Symposium. Boston, MA. ...
doaj:60901051bd8a4cfb84eb2d033863eca8
fatcat:452fhj4bijd4tbqpw4b24noos4
A survey of static analysis methods for identifying security vulnerabilities in software systems
2007
IBM Systems Journal
Dean, “Setuid Demystified,” Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, USENIX Association (August 2002), pp. 171-190.
F. Schneider, G. Morrisett, and R. ...
Wagner, “Detecting Format String Vulnerabilities with Type Qualifiers,” Proceedings of the 10th USENIX Security Symposium, Washington, DC, USA (August 2001),
pp. 201-220.
J. S. Foster, T. ...
doi:10.1147/sj.462.0265
fatcat:ykcfy2vgdzgllnxprlyyiieaia
Field Programmable Gate Array Applications—A Scientometric Review
2019
Computation
Also, we present an evolution and trend analysis of the related applications. ...
Here we found the top 150 applications that we divided into the following categories: digital control, communication interfaces, networking, computer security, cryptography techniques, machine learning ...
Security analysis of a cryptographically-enabled RFID device. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, 31 July-5 August 2005. 166. Kavun, E.B.; Yalcin, T. ...
doi:10.3390/computation7040063
fatcat:wxtatzsvvnfopghdfl25hcfc2a
A Comprehensive Survey on Sharding in Blockchains
2021
Mobile Information Systems
Therefore, based on the three-layer architecture, this study presents a variety of solutions to improve the scalability of the blockchain. ...
As the scale of the network expands, one of the most practical ways to achieve horizontal scalability is sharding, where the network is divided into multiple subnetworks to avoid repeated communication ...
the 24th {USENIX}Security Symposium ({USENIX} Security
[54] T. Haerder and A. Reuter, “Principles of transaction-oriented 15), pp. 129–144, Washington, DC, USA, August 2015. ...
doi:10.1155/2021/5483243
fatcat:x67pir24enadjaauwvbh76dpre
Invalidation-Based Protocols for Replicated Datastores
[article]
2021
arXiv
pre-print
Meanwhile, the opposite occurs in the world of multiprocessors, where data are replicated across the private caches of different cores. ...
The primary contribution of this thesis is in adapting invalidating protocols to the nuances of replicated datastores, which include skewed data accesses, fault tolerance, and distributed transactions. ...
In Proceedings of the USENIX Winter 1994 Technical
Conference on USENIX Winter 1994 Technical Conference, WTEC ’94,
pages 10–10, Berkeley, CA, USA, 1994. USENIX Association. ...
arXiv:2112.02405v1
fatcat:toi3wflouvbzngpdfzypw3l4li
[Front cover]
2020
2020 IEEE 6th World Forum on Internet of Things (WF-IoT)
Symposium (ICTIS) since 2005, and NATO Advanced Research Workshop on Information Security Assurance Co-director, Tetuan, June 3-6, 2005. ...
He was the co-editor of the book "Information Assurance and Computer Security", IOS Press, 2007. ...
doi:10.1109/wf-iot48130.2020.9221244
fatcat:nfrea7jitzh4tpn5k4sg3bsnmq
Invalidation-based protocols for replicated datastores
[article]
2021
Meanwhile, the opposite occurs in the world of multiprocessors, where data are replicated across the private caches of different cores. ...
The primary contribution of this thesis is in adapting invalidating protocols to the nuances of replicated datastores, which include skewed data accesses, fault tolerance, and distributed transactions. ...
In Proceedings of the USENIX Winter 1994 Technical
Conference on USENIX Winter 1994 Technical Conference, WTEC ’94,
pages 10–10, Berkeley, CA, USA, 1994. ...
doi:10.7488/era/1639
fatcat:snjzrhkqqnc7dpsfe4gzaskhqa
Results of SEI Independent Research and Development Projects FY 2006
2018
These projects serve to (1) support feasibility studies investigating whether further work by the SEI would be of potential benefit and (2) support further exploratory work to determine whether there is ...
sufficient value in eventually funding the feasibility study work as an SEI initiative. ...
Boston,
MA (USA): Addison-Wesley, 2006.
[Gray 2005]
Gray, D. E. & Gibson, D. "Déjà Vu, Again and Again." Proceedings of the 2005 SEPG (SEPG
2005). Seattle, WA (USA), March 7-10, 2005. ...
doi:10.1184/r1/6583376
fatcat:kszugi3fzbdk5mm4t7pqepgxfm
Special Issue: Advances in Network Systems
2012
unpublished
To stimulate the cooperation between commercial research community and academia, the first edition of Frontiers in Network Applications and Network Systems symposium was organized in 2012. ...
The success of WWW applications, API exposition via web services or ubiquitous mobile access is immediately followed by significant challenges related to performance, security, or privacy issues of network ...
Acknowledgement This work is supported by the Ministry of Education, Youth, and Sport of the Czech Republic -University spec. research -1311. ...
fatcat:cawnzh5r35hjzke3tpwe3d2dsu
Transaction and Message: From Database to Marketplace, 1970-2000
[article]
2018
And parts of Chapter 6, "The Platform as Exchange", previously appeared in Economic Sociology: the European Electronic Newsletter. ...
employ of the Department of Neurology. ...
Acknowledgements ix
ACKNOWLEDGEMENTS In the Department of Sociology, Ben Merriman always seemed to believe in me even when I didn't, and was a persistent supporter of my work and ideas; I also thank ...
doi:10.6082/m1sn0746
fatcat:nrq7epxxuzcplb3wiznue4gani