The internet of things is one of the most rapidly developing technologies, and its low cost and usability make it applicable to various critical disciplines. Being a component of such critical infrastructure needs, these networks have to be dependable and offer the best outcome. Keeping track of network events is one method for enhancing network reliability, as network event logging supports essential processes such as debugging, checkpointing, auditing, root-cause analysis, and forensics. However, logging in the IoT networks is not a simple task. IoT devices are positioned in remote places with unstable connectivity and inadequate security protocols, making them vulnerable to environmental flaws and security breaches. This thesis inv...
We begin this thesis by generalizing some results related to a recently proposed positive system mod...
The Internet of Things is a novel paradigm which involves the increasing prevalence of objects and e...
The advent of the IPv6 protocol on enterprise networks provides fresh challenges to network incident...
The internet of things is one of the most rapidly developing technologies, and its low cost and usab...
The exponential growth of Internet of Things (IoT) infrastructure has introduced significant securit...
In many large-scale software and hardware systems, log files provide a crucial source of information...
This thesis investigates how transparency log overlays can provide additional security guarantees fo...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, lar...
The explosion in popularity and relevance of the Internet of Things has ushered in a new era in auto...
The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real...
Every day, computer networks throughout the world face a constant onslaught of attacks. To combat th...
Future industrial networks will consist of a mixture of old and new components, due to the very long...
[EN] In our everyday life, many things are done electronically, e-mails, buying different tickets, n...
After its birth in cryptocurrencies, distributed ledger (blockchain) technology rapidly grew in popu...
We begin this thesis by generalizing some results related to a recently proposed positive system mod...
The Internet of Things is a novel paradigm which involves the increasing prevalence of objects and e...
The advent of the IPv6 protocol on enterprise networks provides fresh challenges to network incident...
The internet of things is one of the most rapidly developing technologies, and its low cost and usab...
The exponential growth of Internet of Things (IoT) infrastructure has introduced significant securit...
In many large-scale software and hardware systems, log files provide a crucial source of information...
This thesis investigates how transparency log overlays can provide additional security guarantees fo...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, lar...
The explosion in popularity and relevance of the Internet of Things has ushered in a new era in auto...
The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real...
Every day, computer networks throughout the world face a constant onslaught of attacks. To combat th...
Future industrial networks will consist of a mixture of old and new components, due to the very long...
[EN] In our everyday life, many things are done electronically, e-mails, buying different tickets, n...
After its birth in cryptocurrencies, distributed ledger (blockchain) technology rapidly grew in popu...
We begin this thesis by generalizing some results related to a recently proposed positive system mod...
The Internet of Things is a novel paradigm which involves the increasing prevalence of objects and e...
The advent of the IPv6 protocol on enterprise networks provides fresh challenges to network incident...