SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:9798350325676 OR L773:9783903176584 "

Sökning: L773:9798350325676 OR L773:9783903176584

  • Resultat 1-2 av 2
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Caso, Giuseppe, et al. (författare)
  • An Initial Look into the Performance Evolution of 5G Non-Standalone Networks
  • 2023
  • Ingår i: TMA 2023 - Proceedings of the 7th Network Traffic Measurement and Analysis Conference. - : Institute of Electrical and Electronics Engineers (IEEE). - 9798350325676 - 9783903176584 ; , s. 1-4
  • Konferensbidrag (refereegranskat)abstract
    • Fifth Generation (5G) networks have been operational worldwide for a couple of years. To reveal how the 5G system evolution (e.g., changes in network conditions, deployment, and configurations) affects user performance, empirical long-term analyses are required. This paper presents preliminary insights from our ongoing large-scale measurement study of the commercial 5G non-standalone (NSA) networks deployed in Rome, Italy. An initial comparison between the measurements in 2020-2021 vs. 2023 shows a decrease in throughput and latency performance, calling for deeper analyses toward understanding the root causes and deriving proper optimization solutions. 
  •  
2.
  • Hasselquist, David, et al. (författare)
  • Phishing in Style: Characterizing Phishing Websites in the Wild
  • 2023
  • Ingår i: Proc. Network Traffic Measurement and Analysis Conference (TMA). - : Institute of Electrical and Electronics Engineers (IEEE). - 9783903176584 - 9798350325676
  • Konferensbidrag (refereegranskat)abstract
    • The prevalence of phishing domains is steadily rising as attackers exploit toolkits to create phishing websites. As web development expertise is no longer a prerequisite, phishing attacks have become more widespread, outpacing many existing detection methods. Developing novel techniques to identify malicious domains is crucial to safeguard potential victims online. While most current methods emphasize the visual aspects of phishing websites, in this paper, we investigate the underlying structure by collecting data on style sheets and certificates from both verified phishing domains and benign domains. Using a token-based similarity algorithm, we group the phishing domains into three categories and identify shared characteristics of these domains. Our work demonstrates the feasibility of using structural similarities to identify a website created using a phishing kit. By employing such detection, users would be able to browse the web with a reduced risk of falling victim to malicious activities.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-2 av 2

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy