The politicisation of internet privacy regulation
Abstract Despite a rich body of literature on politicisation, knowledge of this process and its driving forces remains limited. Specifically, little empirical analysis has been carried out to assess the impact of focusing events on politicisation within global and seemingly technical venues of policy‐making.
ELISE ANTOINE
wiley +1 more source
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
This paper provides a lightweight 1D‐CNN model to distinguish different types of network traffic flows passing through a secure network. More specifically, it identifies and further characterizes the application type in complex network flows. Abstract The evergrowing diversity of encrypted and anonymous network traffic makes network management more ...
Faiz Ul Islam +3 more
wiley +1 more source
OpenBNG: Central office network functions on programmable data plane hardware
Summary Telecommunication providers continuously evolve their network infrastructure by increasing performance, lowering time to market, providing new services, and reducing the cost of the infrastructure and its operation. Network function virtualization (NFV) on commodity hardware offers an attractive, low‐cost platform to establish innovations much ...
Ralf Kundel +10 more
wiley +1 more source
Small‐Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review
Developing specialized cloud‐based and open‐source testbeds is a practical approach to investigate network slicing functionalities in the fifth‐generation (5G) mobile networks. This paper provides a comprehensive review of most of the existing cost‐efficient and small‐scale testbeds that partially or fully deploy network slicing.
Ali Esmaeily +2 more
wiley +1 more source
Cyber‐Security Assessment of Industry 4.0 Enabled Mechatronic System
This paper reports on development of a laboratory set‐up, for testing the concept and the components of Industry 4.0 enabled mechatronic system. A simple mock manufacturing lane is connected to a collaborating robot. There are three different programmable logic controllers (PLC) and various other elements which need to talk to each other using a ...
Piotr Kotuszewski +10 more
wiley +1 more source
On Man‐in‐the‐Middle Attack Risks of the VPN Gate Relay System
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer‐organized public VPN relay system launched in 2013.
Yunxiao Sun +4 more
wiley +1 more source
Nomadic input on mobile devices: the influence of touch input technique and walking speed on performance and offset modeling [PDF]
In everyday life people use their mobile phones on-the-go with different walking speeds and with different touch input techniques. Unfortunately, much of the published research in mobile interaction does not quantify the influence of these variables.
Murray-Smith, Roderick, Musić, Josip
core +1 more source
A Survey of Key Technologies for Constructing Network Covert Channel
In order to protect user privacy or guarantee free access to the Internet, the network covert channel has become a hot research topic. It refers to an information channel in which the messages are covertly transmitted under the network environment. In recent years, many new construction schemes of network covert channels are proposed.
Jing Tian +4 more
wiley +1 more source
A Tunnel-aware Language for Network Packet Filtering [PDF]
—While in computer networks the number of possible protocol encapsulations is growing day after day, network administrators face ever increasing difficulties in selecting accurately the traffic they need to inspect.
Ciminiera, Luigi +4 more
core +2 more sources
PPTP VPN and L2TP/IPsec VPN Performance as Voice Data Security in VoIP
Martono Dwi Atmadja +2 more
exaly +2 more sources

