As Technology pushes the limits of removable media-so drives the need for a new file system in order to support the larger capacities and faster access speeds being designed …
N Ishikura, D Kondo, V Vassiliades… - … on Network and …, 2021 - ieeexplore.ieee.org
Many enterprises are under threat of targeted attacks aiming at data exfiltration. To launch such attacks, in recent years, attackers with their malware have exploited a covert channel …
A Mileva, B Panajotov - Open Computer Science, 2014 - degruyter.com
Covert channels in TCP/IP protocol stack - extended version- Skip to content Should you have institutional access? Here's how to get it ... De Gruyter € EUR - Euro £ GBP - Pound $ USD …
R Mitsuhashi, Y Jin, K Iida… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
DNS over HTTPS (Do) can mitigate the risk of privacy breaches but makes it difficult to control network security services due to the DNS traffic encryption. However, since malicious …
Botmasters are known to use different protocols to hide their activities. Throughout the past few years, several protocols have been abused, and recently Domain Name System (DNS) …
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & …
Current large-scale IPv6 studies mostly rely on non-public datasets, as most public datasets are domain specific. For instance, traceroute-based datasets are biased toward network …
D Herrmann, H Pridöhl - The ethics of cybersecurity, 2020 - library.oapen.org
This introductory chapter reviews the fundamental concepts of cybersecurity. It begins with common threats to information and systems to illustrate how matters of security can be …
The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need DNS to work, both for traditional domain name to …