Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 2 de 2
Filter
Add filters

Database
Type of study
Language
Document Type
Year range
1.
International Conference on Electrical and Electronics Engineering, ICEEE 2022 ; 894 LNEE:565-576, 2022.
Article in English | Scopus | ID: covidwho-1826339

ABSTRACT

The Internet and networking have evolved substantially into new forms and types. These technologies are used by everyone in the 21st century. After the COVID pandemic, everything has become more virtual, and most transactions, including studies, were accomplished online. With the growth in technology and services, the risk of them being exploited increases. Cybersecurity is a collection of technologies, procedures, and practices aimed at preventing attacks, damage, and illegal access to networks, devices, programs, and data. Overcoming the cybersecurity challenges is even more complicated due to the lack of training and unavailable cybersecurity environments. Cybersecurity experiments must be run in a realistic and controllable environment. In this work, we have set up a virtual environment to provide the required resources for the user to learn cybersecurity skills. We have demonstrated eight cyber attacks. Each attack is provided with a demo video and an automated version of the attack. The user is provided with steps to practice how the attack works and instructions to mitigate these attacks. These resources are made available on-demand to the user through a web portal. The performance analysis has been done for every attack. The launch time of the automated attacks is also recorded and analyzed. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

2.
7th International Symposium on Ubiquitous Networking, UNet 2021 ; 12845 LNCS:186-198, 2021.
Article in English | Scopus | ID: covidwho-1603422

ABSTRACT

Computing in the network (COIN) is a promising technology that allows processing to be carried out within network devices such as switches and network interface cards. Time sensitive application can achieve their quality of service (QoS) target by flexibly distributing the caching and computing tasks in the cloud-edge-mist continuum. This paper highlights the advantages of in-network computing, comparing to edge computing, in terms of latency and traffic filtering. We consider a critical use case related to Covid-19 alert application in an airport setting. Arriving travelers are monitored through cough analysis so that potentially infected cases can be detected and isolated for medical tests. A performance comparison has been done between an architecture using in-network computing and another one using edge computing. We show using simulations that in-network computing outperforms edge computing in terms of Round Trip Time (RTT) and traffic filtering. © 2021, Springer Nature Switzerland AG.

SELECTION OF CITATIONS
SEARCH DETAIL