In recent years, a variety of cybersecurity attacks affected national infrastructures, big companies, and even medium size organizations. As countermeasures are implemented …
DG Berbecaru, A Lioy - … of the 19th International Conference on …, 2024 - dl.acm.org
Various applications running in network-based, mobile, Internet of Things, or embedded systems environments exploit the Transport Layer Security (TLS) protocol to secure …
DG Berbecaru, S Giannuzzi - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
In recent years, anomaly-based intrusion detection systems using machine learning (ML) and deep learning techniques have started to be developed to mitigate cybersecurity …
D Margaria, A Carelli, A Vesco - arXiv preprint arXiv:2403.02225, 2024 - arxiv.org
Nowadays, Internet of Things platforms are being deployed in a wide range of application domains. Some of these include use cases with security requirements, where the data …
The Transport Layer Security (TLS) interceptors are applications running on client devices or on separate machines that filter TLS-protected traffic between two endpoints. They split the …
As businesses increasingly depend on these cloud-based services, secure cloud computing is vital. There is no free way with the cloud network, and our information is susceptible to …