On the monitorability of session types, in theory and practice

… ” process that may not be statically verified. After formalising a streamlined process calculus
with session … 9, the monitor is the entity that interacts with the environment (represented as a …

A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers

R Bitton, A Shabtai - IEEE Transactions on Dependable and …, 2019 - ieeexplore.ieee.org
network based intrusion detection system (NIDS) specifically designed for securing the
remote desktop connections… detection method is designed to prevent malicious entities from …

A software-defined networking solution for transparent session and service continuity in dynamic multi-access edge computing

P Fondo-Ferreiro, F Gil-Castiñeira… - … on Network and …, 2020 - ieeexplore.ieee.org
… , it is not interoperable with existing core network entities, since it replaces them completely.
connections undisturbed, the initial S/P-GW should continue to serve all connections except …

Secure session key generation method for LoRaWAN servers

KL Tsai, FY Leu, LL Hung, CY Ko - IEEE Access, 2020 - ieeexplore.ieee.org
… to communicate with relevant entities in the network, so as to protect data transmitted over the
… In this section, the session-key generation procedure for serving network server and home …

Unified host and network data set

MJM Turcotte, AD Kent, C Hash - Data science for cyber-security, 2019 - World Scientific
… The network flow data set included in this release is … uniflows of bi-directional connections
into a single,directed biflow … authenticate as a unique entity within the network. Figure 7 shows …

Support of a multi-access session in 5g mobile network

J Ha, YI Choi - 2019 25th Asia-Pacific Conference on …, 2019 - ieeexplore.ieee.org
… We will discuss PDU session establishment and release procedures and other related issues
… SM_ATSF is main controlling entity of ATSSS. It enforces ATSSS policy and is responsible …

Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion

C Cremers, M Dehnel-Wild - Network and Distributed System Security …, 2019 - ora.ox.ac.uk
… AUSF and ARPF) to form a single ‘Home Networkentity, similar to previous AKA versions.
They … As a result of our publicly released document and change request, SA3 have stated that …

[HTML][HTML] Formalization of the metric of parameters for quality evaluation of the subject-system interaction session in the 5G-IoT ecosystem

V Kovtun, I Izonin, M Gregus - Alexandria Engineering Journal, 2022 - Elsevier
… ensuring the availability of network connections, including in … mobile M2M devices and other
entities over large areas. The … interaction, the amount of system resources released at the …

Towards automated auditing for account and session management flaws in single sign-on deployments

M Ghasemisharif, C Kanich… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
entities that provide an authentication service to other entities. We use “SSO support” when
a thirdparty entity … We repeat this process to ensure that unexpected errors, due to network

Broadcast core-network: Converging broadcasting with the connected world

J Montalban, R Cabrera, E Iradier… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… or logical entity in 4G EPC is translated into a Network Function… , it will collect all network
connection and session control … heterogeneous network converged services starting release 16,…