K MacMillan, T Mangla, J Saxon… - Proceedings of the 21st …, 2021 - dl.acm.org
Video conferencing applications (VCAs) have become a critical Internet application during the COVID-19 pandemic, as users worldwide now rely on them for work, school, and …
We present the design, implementation, and evaluation of an API for applications to control a software-defined network (SDN). Our API is implemented by an OpenFlow controller that …
This book is a second edition, updated and expanded to explain the technologies that help us find information on the web. Search engines and web navigation tools have become …
R Alshammari… - 2009 IEEE symposium on …, 2009 - ieeexplore.ieee.org
The objective of this work is to assess the robustness of machine learning based traffic classification for classifying encrypted traffic where SSH and Skype are taken as good …
The rapid growth of communications and multimedia network services such as Voice over Internet Protocol (VoIP) have caused these networks to face a crisis in resources from two …
Desktops can be exploited to violate privacy. There are two main types of attack scenarios: active and passive. We consider the passive scenario where the adversary does not interact …
J Muehlstein, Y Zion, M Bahumi… - 2017 14th IEEE …, 2017 - ieeexplore.ieee.org
Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario …
In response to increasingly sophisticated methods of blocking access to censorship circumvention schemes such as Tor, recently proposed systems such as Skypemorph …