The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Low latency is critical for delay-sensitive applications such as video surveillance, live streaming, and online data analytics. Fog computing enables the emergence of the latency-sensitive internet of things (IoT) network to support real-time applications. While the distance between sensing and processing is minimized in the fog network, the cross-fog latency is yet to be determined. In this paper,...
Domain Name System (DNS) is one of the most crucial components of the Internet. However, due to the vulnerability of DNS, its security has been continuously challenged in recent years. In order to thoroughly understand the root cause of the security risks in the DNS, researches in DNS security are surveyed, and vulnerabilities in DNS and corresponding countermeasures are summarized. First, based on...
Nowadays, smart environments (e.g., smart home, smart city) are built heavily relying on Cloud computing for the coordination and collaboration among smart objects. Cloud is typically centralized but smart objects are ubiquitously distributed, thus, data transmission latency (i.e., end-to-end delay or response time) between Cloud and smart objects is a critical issue especially to the applications...
With increasing denial of service attacks on network infrastructure, there is an urgent need to develop technique to assess the threat of attacks on network security online. A novel model of security threat assessment relying on several predefined metrics of network performance is proposed to measure the impact of denial of service attacks on service availability in real time. This model applies the...
Active content transformation in Web is a hot topic in Internet content delivery research. In this paper, we proposed 3 different modes content transformation, which are whole-file buffering, byte-streaming, and chunk buffering. Based on the chunk dependence graph, we studied the performance for different modes and argued that the chunk streaming is the most appropriate transform model for Web intermediaries...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.