The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a moderately simple to implement but very effective and silent deanonymization scheme for Tor traffic. This is done by bridging the mixes in Tor, that is, we control both the traffic leaving the Onion Proxy (OP) and the traffic entering the Exit node. Specifically, from a user's viewpoint, our proposal has been implemented in the popular Android platform as a spyware, having the dual aim...
The complexity and robustness of the currently used IP telephony infrastructures requires systematic monitoring of the network against security threats, where captured incidents are often used as a source of information for further research and analytical optimization of the monitored topologies. This article presents an analysis of IP telephony security issues which were clasiffied using neural networks...
The end-point of the cloud trend is that all computational and storage resources leave the homes and move to the cloud. We can be rather certain the future eventually looks like this as IT and telecommunications services are commoditised and the end users' time, interest and skill to acquire and maintain electronics fade away. The network architecture suitable for such scenario will be analysed in...
The aim of this research is to enhance the performance of the Fast Re-Route (FRR) mechanism by adopting a methodology similar in many aspects to that used in Software Defined Networking (SDN). This methodology is represented by using a central controller to calculate the paths of backup MPLS tunnels that are used to protect previously established primary MPLS tunnels, and a messaging system to install...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.