Q Xing, B Wang, X Wang - Symmetry, 2018 - mdpi.com
Without the design for inherent security, the Border Gateway Protocol (BGP) is vulnerable to prefix/subprefix hijacks and other attacks. Though many BGP security approaches have …
H Saini, B Bhushan, A Arora… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
With the increasing concerns about the security of data, Blockchain a decentralised public ledger, linked block structure which verifies and stores data and follows trusted consensus …
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks Key FeaturesExplore …
Abstract The Domain Name System (DNS) is a fundamental backbone service of the Internet. In practice, this infrastructure often shows flaws, which indicate that measuring the …
A Herzberg, H Shulman - 2013 IEEE Conference on …, 2013 - ieeexplore.ieee.org
DNSSEC was proposed more than 15 years ago but its (correct) adoption is still very limited. Recent cache poisoning attacks motivate deployment of DNSSEC. In this work we present a …
Over the last 15 years, Software-Defined Networking (SDN) has gained widespread support from both research communities and the industry owing to its open nature and …
Electronic government (e-gov) enables citizens and residents to digitally interact with their government via the Internet. Underpinning these services is the Internet Domain Name …
The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol (IP) addresses plays a foundational role in Internet communications. By default, DNS …
A Long, D Choi, J Coffman - 2022 IEEE World AI IoT Congress …, 2022 - ieeexplore.ieee.org
Blockchains emerged in the past decade with applications across a myriad of domains, however this nascent field has so far been commonly associated with cryptocurrencies. The …