Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJanuary 2024
Malware Classification Using Open Set Recognition and HTTP Protocol Requests
AbstractMalware is a serious threat to the modern Internet, as it is used to, e.g., sending spam or stealing bank login credentials. Typically, to communicate with the attacker, it utilizes popular network protocols such as the HyperText Transfer Protocol ...
- research-articleMarch 2023
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior
Highlights- Real-time driving status tracking and monitoring.
- Analysis of the necessary ...
One of the most prevalent causes of road accidents is aggressive and irrational driving, which puts lives and property in danger. To reduce traffic crashes and improve road safety, we urgently need reliable and effective techniques for ...
- research-articleNovember 2020
Real-Time IoT Based Urban Street Water-Logging Monitoring System Using Google Maps
IPMV '20: Proceedings of the 2020 2nd International Conference on Image Processing and Machine VisionPages 100–104https://doi.org/10.1145/3421558.3421574Water-logging in urban area is a phenomenon of water catastrophe because of rainstorm or continuous rainfall which exceeds the urban's drainage capacity. At present, the monitoring and detection on urban's water-logging rely a great deal on climate ...
- ArticleJune 2020
Typechecking Java Protocols with [St]Mungo
Formal Techniques for Distributed Objects, Components, and SystemsPages 208–224https://doi.org/10.1007/978-3-030-50086-3_12AbstractThis is a tutorial paper on [St]Mungo, a toolchain based on multiparty session types and their connection to typestates for safe distributed programming in Java language.
The StMungo (“Scribble-to-Mungo”) tool is a bridge between multiparty session ...
- short-paperSeptember 2019
Modeling of low-rate DDoS-attacks
SIN '19: Proceedings of the 12th International Conference on Security of Information and NetworksArticle No.: 24, Pages 1–4https://doi.org/10.1145/3357613.3357638The paper presents the results of the analysis and simulation study of Denial of Service attacks for a variety of services that store, process and transmit data to the Internet. Focuses on the simulation of low-rate Distributed Denial of Service attacks ...
- research-articleOctober 2016
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1516–1527https://doi.org/10.1145/2976749.2978394The Host header is a security-critical component in an HTTP request, as it is used as the basis for enforcing security and caching policies. While the current specification is generally clear on how host-related protocol fields should be parsed and ...
- ArticleMay 2010
Design and Implementation of Windows Service Client Based on HTTP
ICEE '10: Proceedings of the 2010 International Conference on E-Business and E-GovernmentPages 3868–3871https://doi.org/10.1109/ICEE.2010.970In some cases, we need to perform certain functions after computer is started, but not logged. This is the role of the service program. This article discusses the establishment of an installation, operation, start and stop function of the windows ...
- articleDecember 2004
DHTTP: an efficient and cache-friendly transfer protocol for the web
IEEE/ACM Transactions on Networking (TON), Volume 12, Issue 6Pages 1007–1020https://doi.org/10.1109/TNET.2004.838602Today's HTTP carries Web interactions over client-initiated TCP connections. An important implication of using this transport method is that interception caches in the network violate the end-to-end principle of the Internet, which severely limits ...
- ArticleNovember 1997
An Embedded Visual Programming Interface For Intelligent Information Retrieval On The Web
The paper describes an embedded visual programming interface for intelligent information retrieval built on the top of the Web. The system is the integration of visual programming, the standard Web technologies, Java applets, inference engine, and ...