Movatterモバイル変換


[0]ホーム

URL:


Xiao et al., 2014 - Google Patents

GlobalView: building global view with log files in a distributed/networked system for accountability

Xiao et al., 2014

ViewPDF
Document ID
87772374147861164
Author
Xiao Y
Yue S
Fu B
Ozdemir S
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

In this work, we will illustrate our attempt to exploit log files that are recorded locally on each node in a distributed system or a wired/wireless network. In order to improve the efficiency of retrieving data, we propose the idea of building a global view of the system with a clustered …
Continue reading atwww.researchgate.net (PDF) (other versions)

Similar Documents

PublicationPublication DateTitle
Swessi et al.A survey on internet-of-things security: threats and emerging countermeasures
Da Xu et al.Embedding blockchain technology into IoT for security: A survey
Yahuza et al.Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities
Jurcut et al.Introduction to IoT security
US11863434B2 (en)System and method of providing policy selection in a network
Puthal et al.SEEN: A selective encryption method to ensure confidentiality for big sensing data streams
Meng et al.Collaborative security: A survey and taxonomy
Patwary et al.Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review
Jiasi et al.Secure software-defined networking based on blockchain
XiaoAccountability for wireless LANs, ad hoc networks, and wireless mesh networks
Jabraeil Jamali et al.IoT security
Li et al.BCTrustFrame: Enhancing trust management via blockchain and IPFS in 6G era
Bou-Harb et al.Cyber threat intelligence for the internet of things
Xiao et al.Accountability using flow‐net: design, implementation, and performance evaluation
Xiao et al.GlobalView: building global view with log files in a distributed/networked system for accountability
Yeh et al.A collaborative DDoS defense platform based on blockchain technology
Jaigirdar et al.Risk and compliance in IoT-health data propagation: a security-aware provenance based approach
Amanlou et al.Cybersecurity challenges in smart grid systems: current and emerging attacks, opportunities, and recommendations
Wang et al.A data plane security model of SR-BE/TE based on zero-trust architecture
Trivedi et al.Security and privacy aspects in the internet of things (IoT) and cyber-physical systems (CPS)
CN116827821B (en)Block chain cloud-based application program performance monitoring method
Li et al.Network Security
Faraj et al.Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review
Rull AixaAnalysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach
Hamza et al.Securing IoT networks using formal behavioral modeling and dynamic flow management

[8]ページ先頭

©2009-2025 Movatter.jp