LSTM-Based Detection for Timing Attacks in Named Data Network
暂无分享,去创建一个
[1] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[2] Andrew W. Senior,et al. Long Short-Term Memory Based Recurrent Neural Network Architectures for Large Vocabulary Speech Recognition , 2014, ArXiv.
[3] Retantyo Wardoyo,et al. Time Complexity Analysis of Support Vector Machines (SVM) in LibSVM , 2015 .
[4] Ertugrul Dogruluk,et al. Identifying Previously Requested Content by Side-Channel Timing Attack in NDN , 2018, FNSS.
[5] Ertugrul Dogruluk,et al. Evaluating privacy attacks in Named Data Network , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).
[6] Naveen Kumar,et al. A Triggered Delay-based Approach against Cache Privacy Attack in NDN , 2018, 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS).
[7] Satyajayant Misra,et al. Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[8] Mario Gerla,et al. Centrality-based caching for privacy in Information-Centric Networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[9] Donald F. Towsley,et al. Approximate Models for General Cache Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Aziz Mohaisen,et al. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures , 2015, IEEE Transactions on Dependable and Secure Computing.
[11] Thomas Engel,et al. Security Monitoring for Content-Centric Networking , 2012, DPM/SETOP.
[12] Mauro Conti,et al. Cache Privacy in Named-Data Networking , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[13] Hani Salah,et al. CoMon++: Preventing Cache Pollution in NDN Efficiently and Effectively , 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN).
[14] Neeraj Suri,et al. Named Data Networking: A survey , 2016, Comput. Sci. Rev..
[15] Anand Seetharam. On Caching and Routing in Information-Centric Networks , 2018, IEEE Communications Magazine.
[16] Lin Yao,et al. Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks , 2020, IEEE Transactions on Dependable and Secure Computing.
[17] Sunyoung Han,et al. Detecting router cache snooping in Named Data Networking , 2012, 2012 International Conference on ICT Convergence (ICTC).