B Bhushan, G Sahoo, AK Rai - 2017 3rd International …, 2017 - ieeexplore.ieee.org
One of the most discussed attacks in computer security is Man-In-The-Middle attack and it is a serious concern for many security professionals. The attackers target the actual data …
C Ghali, G Tsudik, E Uzun - … of NDSS workshop on security of …, 2014 - sprout.ics.uci.edu
Named-Data Networking (NDN) is a candidate next-generation Internet architecture designed to address some limitations of the current IP-based Internet. NDN uses the pull …
D Yu, Y Jin, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging applications. To incorporate various design choices and customized policies in fog …
While communication-based train control (CBTC) systems play a crucial role in the efficient and reliable operation of urban rail transits, its high penetration level of communication …
Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural …
Most eye trackers work well for open eyes. However blinking is a physiological necessity for humans. More over, for applications such as facial expression analysis and driver …
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an …
In this work, we demonstrate a novel attack in SDN networks, Persona Hijacking, that breaks the bindings of all layers of the networking stack and fools the network infrastructure into …
Abstract Software-Defined Networking (SDN) is a programmable network architecture that allows network devices to be controlled remotely, but it is still highly susceptible to traditional …