Search
Now showing items 1-5 of 5
Synchronizing DDoS Defense at Network Edge with P4, SDN, and Blockchain
(2022-10-24)
Botnet-originated DDoS attacks continue to plague the internet and disrupt services for legitimate users. While various proposals have been presented in the last two decades, the botnet still has advantages over the ...
Coloured Velvet is Too Gaudy: The 1861 Reforms to the Academical Costume of the University of London
(2022-10-08)
The University of London’s original system of academic dress was adopted by the Senate in 1844, and made extensive use of velvet on both gowns and hoods. In 1861 London adopted a radically new system, which eliminated the ...
Global Convergence of a Curvilinear Search for Non-Convex Optimization
(2022-08-26)
For a non-convex function f : R^n → R with gradient g and Hessian H, define a step vector p(μ,x) as a function of scalar parameter μ and position vector x by the equation (H(x) + μI)p(μ, x) = −g(x). Under mild conditions ...
Edge Security for SIP-enabled IoT Devices with P4
(2022-02-11)
The exponential growth of IoT devices poses security concerns, in part because they provide a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 devices in its first 20 hours. With ...
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks
(2022-01-12)
The distributed nature of mobile ad hoc networks (MANETs) presents security challenges and vulnerabilities which sometimes lead to several forms of attacks. To improve the security in MANETs, reputation and trust management ...