A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers

R Bitton, A Shabtai - IEEE Transactions on Dependable and …, 2019 - ieeexplore.ieee.org
network based intrusion detection system (NIDS) specifically designed for securing the
remote desktop connections… detection method is designed to prevent malicious entities from …

Design patterns and extensibility of REST API for networking applications

L Li, W Chou, W Zhou, M Luo - IEEE Transactions on Network …, 2016 - ieeexplore.ieee.org
… not explicitly define resource identifications and connections. Instead, it … Each network entity
has its ID attribute and a network … with the OpenStack Grizzly release was deployed on one …

Release the Kraken: new KRACKs in the 802.11 Standard

M Vanhoef, F Piessens - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
… reuse the SNonce or ANonce when refreshing the session key using the 4-way handshake.
… is connected to an enterprise network, and the adversary can also connect to this network. In …

Secure session key generation method for LoRaWAN servers

KL Tsai, FY Leu, LL Hung, CY Ko - IEEE Access, 2020 - ieeexplore.ieee.org
… to communicate with relevant entities in the network, so as to protect data transmitted over the
… In this section, the session-key generation procedure for serving network server and home …

Unified host and network data set

MJM Turcotte, AD Kent, C Hash - Data science for cyber-security, 2019 - World Scientific
… The network flow data set included in this release is … uniflows of bi-directional connections
into a single,directed biflow … authenticate as a unique entity within the network. Figure 7 shows …

Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion

C Cremers, M Dehnel-Wild - Network and Distributed System Security …, 2019 - ora.ox.ac.uk
… AUSF and ARPF) to form a single ‘Home Networkentity, similar to previous AKA versions.
They … As a result of our publicly released document and change request, SA3 have stated that …

Achieve secure handover session key management via mobile relay in LTE-advanced networks

Q Kong, R Lu, S Chen, H Zhu - IEEE internet of things journal, 2016 - ieeexplore.ieee.org
… , where the session keys initially encrypted with the public key of the mobility management
entity (… , which was originally presented in 3GPP release 11 for LTE networks [20]. Then we …

Usage control on cloud systems

E Carniani, D D'Arenzo, A Lazouski, F Martinelli… - … Computer Systems, 2016 - Elsevier
… If an attribute is already locked, the decision process is suspended until the lock is released.
… supporting SSL connections on distinct machines located in our department network, and …

Network slicing as a service: enabling enterprises' own software-defined cellular networks

X Zhou, R Li, T Chen, H Zhang - IEEE Communications …, 2016 - ieeexplore.ieee.org
… and resources within one network entity, according to specific … wireless connections to
enterprises, but also release full … gy of a network describes the connections among the sites of …

A payload-based mutual authentication scheme for Internet of Things

MA Jan, F Khan, M Alam, M Usman - Future Generation Computer Systems, 2019 - Elsevier
… objects to identify themselves to the participating entities. This innovative concept enables
a … in the network. It uses a simple handshake procedure to exchange the session key for the …