Skip to content
Publication Topic:
Cybersecurity
“Network Level IoT Security Using Whitelists”
Eradicating Attacks on the Internal Network with Internal Network Policy
IoT or NoT: Identifying IoT Devices in a ShortTime Scale
Localhost Detour from Public to Private Network
Cross-Site Search Attacks: Unauthorized Queries over Private Data
Mitigating Layer 2 Attacks:<br>Re-Thinking the Division of Labor
Computer and Network Performance: Graduating from the ‘Age of Innocence’
MCA^2: Multi-Core Architecture for Mitigating Complexity Attacks
Detecting and controlling peer-to-peer traffic
Unregister Attacks in SIP