As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (IPSec) features embedded into the next-generation protocol will become more accessible than ever. Though the network-layer encryption provided by IPSec is a boon to data security, its use renders standard network intrusion detection systems (NIDS) useless. The problem of performing intrusion detection on encrypted traffic has been addressed by differing means with each technique requiring one or more static secret keys to be shared with the NIDS beforehand. The problem with this approach is static keying is much less secure than dynamic key generation through the Internet Key Exchange (IKE) protocol. This research creates and evaluates a secre...
Applications using dedicated short-range communication (DSRC) are being developed to prevent automob...
The purpose of this study was to determine how head movement and time were affected by three emergen...
The IPv6 increased address pool presents changes in resource impact to the Enterprise that, if not a...
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (I...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. O...
The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSL...
This thesis first explores how intrusion detection (ID) techniques can be used to provide an extra s...
This thesis aims to introduce a prevention mechanism called DAD-match that comprises three stages, n...
The purpose of Link- 16 is to exchange real-time tactical data among units of the United States and ...
The advent of the IPv6 protocol on enterprise networks provides fresh challenges to network incident...
A network gateway is a mechanism which provides protocol translation and/or validation of network tr...
This thesis study introduces operational concepts for accelerating necessary cyber security improvem...
Applications using dedicated short-range communication (DSRC) are being developed to prevent automob...
The purpose of this study was to determine how head movement and time were affected by three emergen...
The IPv6 increased address pool presents changes in resource impact to the Enterprise that, if not a...
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (I...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. O...
The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSL...
This thesis first explores how intrusion detection (ID) techniques can be used to provide an extra s...
This thesis aims to introduce a prevention mechanism called DAD-match that comprises three stages, n...
The purpose of Link- 16 is to exchange real-time tactical data among units of the United States and ...
The advent of the IPv6 protocol on enterprise networks provides fresh challenges to network incident...
A network gateway is a mechanism which provides protocol translation and/or validation of network tr...
This thesis study introduces operational concepts for accelerating necessary cyber security improvem...
Applications using dedicated short-range communication (DSRC) are being developed to prevent automob...
The purpose of this study was to determine how head movement and time were affected by three emergen...
The IPv6 increased address pool presents changes in resource impact to the Enterprise that, if not a...