Aller au contenu principal
X
Main navigation
Accueil
Grands défis
Articles
Chercheurs
Rechercher
Articles
xBGP: Faster Innovation in Routing Protocols
Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach
The Gap Between UX Literacy and UX Practices in Agile-UX Settings: A Case Study
Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements
Integrity of In-situ OAM Data Fields. Internet Engineering Task Force
Attribution of Internet Probes
Carrying an Identifier in IPv6 packets
Leveraging Large Language Models to Automatically Infer RESTful API Specifications
Automatic Vulnerability Injection using Genetic Improvement and Static Code Analysers
Revue de la littérature sur le débogage de flaky test
Training machine learning models for vulnerability prediction and injection using datasets of vulnerability-inducing commits
Study of the impacts of Code Smells on code Testability
Content Censorship in the InterPlanetary File System
Using eBPF to Injection IPv6 Extension Headers
Implementation and Evaluation of LISP Publish/Subscribe
Experimental demonstration of NFV deployment with RPi and MAAS
An improved PUF-based privacy-preserving IoT protocol for cloud storage
Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs
On Integrating eBPF into Pluginized Protocols
URLink: Using Names As Sole Internet Addresses to Tackle Scanning Attacks in IoT
The packet number space debate in Multipath QUIC
The influence of Bivariate Empirical Mode Decomposition parameters on AI-based Automatic Modulation Recognition accuracy
Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections
On the Introduction of Guarded Lists in Bach: Expressiveness, Correctness, and Efficiency Issues
Mode-Level Side-Channel Countermeasures
Pagination
Page courante
1
Page
2
Page
3
Page suivante
››
Dernière page
Dernier »