IoT devices are known to have security and privacy risks, but studying these risks in a real-world context has been...
Read more arrow_right_altPhishing is one of the most common forms of social engineering attacks and is regularly used by criminals to compromise...
Read more arrow_right_altDuring my stay at IMDEA Networks, I have remarked that the terms “distributed computing” sounded like dark magic to some...
Read more arrow_right_altThe pervasiveness of always-connected mobile devices fostered a multitude of applications that provide contextualized services to users. Many of these...
Read more arrow_right_altIt has been more than eight years since the original P4 paper was published. Since then, programmable data planes have...
Read more arrow_right_altTelcos are increasingly moving from physical/virtual to cloud-native network functions in the context of 5G adoption. In this talk we...
Read more arrow_right_altFlow optimization in the presence of uncertainty about future traffic demands is a fact of life in many operational environments....
Read more arrow_right_altWe live in a world that is full of interconnected sensors, ranging from dedicated monitoring equipment to sensors incorporated into...
Read more arrow_right_altInformation systems are ever-increasingly intelligent and present in the daily lives of people and companies, facilitating and modifying the performance...
Read more arrow_right_altAs in many other organizations, broadband access providers use Active Network Measurements and Trouble Ticket Systems to identify, record and...
Read more arrow_right_alt
Recent Comments