DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 374
1.
  • Evaluation of influence of ... Evaluation of influence of vibrations generated by blasting construction on an existing tunnel in soft soils
    Yu, Haitao; Yuan, Yong; Yu, Guangxi ... Tunnelling and underground space technology, 07/2014, Letnik: 43
    Journal Article
    Recenzirano

    •We quantitatively evaluate the effect of blasting vibrations on an existing tunnel.•We evaluate critical issues on controlled blasting scheme and its implementation.•We discuss safety criterion of ...
Celotno besedilo
Dostopno za: UL
2.
Celotno besedilo
Dostopno za: UL
3.
  • Ultrasensitive one-pot dete... Ultrasensitive one-pot detection of monkeypox virus with RPA and CRISPR in a sucrose-aided multiphase aqueous system
    Wang, Yue; Tang, Yixin; Chen, Yukang ... Microbiology spectrum, 01/2024, Letnik: 12, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The monkeypox virus was declared as a Public Health Emergency of International Concern (PHEIC) by the World Health Organization (WHO) and continues to cause infection cases worldwide. Given the risk ...
Celotno besedilo
Dostopno za: UL
4.
Celotno besedilo
5.
  • Detecting DNS over HTTPS ba... Detecting DNS over HTTPS based data exfiltration
    Zhan, Mengqi; Li, Yang; Yu, Guangxi ... Computer networks (Amsterdam, Netherlands : 1999), 05/2022, Letnik: 209
    Journal Article
    Recenzirano

    DNS is often used by attackers as a covert channel for data exfiltration, also known as DNS tunneling. Since the plaintext DNS lookup leads to privacy issues, DNS over HTTPS (DoH) has recently been ...
Celotno besedilo
Dostopno za: UL
6.
  • Website-Aware Protocol Conf... Website-Aware Protocol Confusion Network for Emergent HTTP/3 Website Fingerprinting
    Zhan, Mengqi; Li, Yang; Zhu, Yongchun ... IEEE transactions on information forensics and security, 2023, Letnik: 18
    Journal Article
    Recenzirano

    Website fingerprinting is exploited to analyze encrypted traffic traces and infer the visited website. Existing website fingerprinting methods can achieve satisfying performance for the HTTP traffic ...
Celotno besedilo
Dostopno za: UL
7.
  • GuardBox: A High-Performanc... GuardBox: A High-Performance Middlebox Providing Confidentiality and Integrity for Packets
    Zhan, Mengqi; Li, Yang; Yu, Guangxi ... IEEE transactions on information forensics and security, 2023, Letnik: 18
    Journal Article
    Recenzirano

    The deepening of digital transformation has led to an increasing amount of data from industries being transmitted over the Internet. However, packets in plaintext originally designed for transmission ...
Celotno besedilo
Dostopno za: UL
8.
  • Coda: Runtime Detection of ... Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers
    Zhan, Mengqi; Li, Yang; Yang, Huiran ... IEEE transactions on services computing, 05/2023, Letnik: 16, Številka: 3
    Journal Article
    Recenzirano

    Denial of service (DoS) attacks have increasingly exploited vulnerabilities in algorithms or implementation methods in application-layer programs. In this type of attack, called CPU-exhaustion DoS ...
Celotno besedilo
Dostopno za: UL
9.
Celotno besedilo

PDF
10.
  • Mitigating Negative Impacts on DNS Caches Caused by Disposable Domain Names
    Yu, Guangxi; Zhang, Yan; Cui, Huajun ... 2019 IEEE Symposium on Computers and Communications (ISCC), 2019-June
    Conference Proceeding

    DNS caches play an important role in DNS querying. However, the performance of DNS caches will be remarkably influenced by disposable domain names, which are generated by services of cloud storage, ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 374

Nalaganje filtrov