M Karakus - IEEE Access, 2024 - ieeexplore.ieee.org
As a result of the ubiquitous network applications and services, exacerbated by the overarching digital revolution the need and demand for efficient and dependable …
K van Hove, J van der Ham-de Vos… - … Threats: Research and …, 2023 - dl.acm.org
The Resource Public Key Infrastucture (RPKI) has been created to solve security shortcomings of the Border Gateway Protocol (BGP). This creates an infrastructure where …
Abstract The Border Gateway Protocol (BGP) helps to exchange the information over the internet. However, BGP is susceptible to malicious attacks and misconfigurations meanwhile …
N Umeda, T Kimura, N Yanai - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
BGP, the de-facto standard protocol for exchanging routes on a network-wide basis called AS employs invalid routes. Recently, a data object called Autonomous System Provider …
This research paper introduces three key problems relevant to data movement across the multi-domains. They are (1) delays in data transmission because of the failures of the …
NR Jaffri - Journal of Computing and Artificial Intelligence, 2023 - brainetwork.org
Data protection, information security and system security are often referred to as cyber security. So if you do some security research in general, you're likely to see these words very …
We have looked into the unique characteristics of the RPKI, where unlike other common protocols all information must be retrieved first, and used that to create a threat model where …