15 downloads
72 views

Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.3322v1
131 downloads
975 views

We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based...

["Computer Networks and Communications","Data Science","Distributed and Parallel Computing","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.3194v2
74 downloads
130 views

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.2998v1
57 downloads
181 views

Transferring a huge amount of data between different network locations over the network links depends on the heterogeneous wireless network. Such a network consists of several networks with different access technologies. Traditionally, a mobile device may be moved...

["Computer Networks and Communications","Mobile and Ubiquitous Computing","Network Science and Online Social Networks"]
doi:10.7287/peerj.preprints.2970v1
813 downloads
1,346 views

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and...

["Computer Networks and Communications","Embedded Computing","Real-Time and Embedded Systems","Security and Privacy","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.114
578 downloads
2,771 views

The timely publication of scientific results is essential for dynamic advances in science. The ubiquitous availability of computers which are connected to a global network made the rapid and low-cost distribution of information through electronic channels possible....

["Human\u2013Computer Interaction","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.112
299 downloads
1,550 views

The timely publication of scientific results is essential for dynamic advances in science. The ubiquitous availability of computers which are connected to a global network made the rapid and low-cost distribution of information through electronic channels possible....

["Human-Computer Interaction","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.2648v2
217 downloads
977 views

"Publication forms the core structure supporting the development and transmission of scientific knowledge" (Galbraith2015). Yet, with the WorldWideWeb a dominant part of current scientific publication and information-dissemination, internet "publication" is still...

["Adaptive and Self-Organizing Systems","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.1568v13
3,352 downloads
1,958 views

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and...

["Computer Networks and Communications","Embedded Computing","Real-Time and Embedded Systems","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.1241v2
194 downloads
882 views

In this paper, we introduce a framework for implementing deep copy on top of MPI. The process is initiated by passing just the root object of the dynamic data structure. Our framework takes care of all pointer traversal, communication, copying and reconstruction...

["Computer Networks and Communications","Distributed and Parallel Computing","Programming Languages"]
doi:10.7717/peerj-cs.95
1 citation
255 downloads
1,329 views

In this paper we introduce SNF, a framework that synthesizes (S) network function (NF) service chains by eliminating redundant I/O and repeated elements, while consolidating stateful cross layer packet operations across the chain. SNF uses graph composition and...

["Computer Networks and Communications"]
doi:10.7717/peerj-cs.98
100 downloads
329 views

In this paper we introduce SNF, a framework that synthesizes (S) network function (NF) service chains by eliminating redundant I/O and repeated elements, while consolidating stateful cross layer packet operations across the chain. SNF uses graph composition and...

["Computer Networks and Communications"]
doi:10.7287/peerj.preprints.2477v3
49 downloads
155 views

This paper introduces a renewed gateway to ENEAGRID distributed computing resources, named Fast Access to Remote Objects 2.0 (FARO 2.0). FARO 2.0 is a tool for application and desktop virtualization with a strong focus towards user experience (UX), providing trained...

["Human-Computer Interaction","Computer Networks and Communications","Distributed and Parallel Computing","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.2537v1
164 downloads
744 views

Opportunistic data forwarding significantly increases the throughput in multi-hop wireless mesh networks by utilizing the broadcast nature of wireless transmissions and the fluctuation of link qualities. Network coding strengthens the robustness of data transmissions...

["Computer Networks and Communications","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.89
2 citations
255 downloads
2,247 views

Publication and archival of scientific results is still commonly considered the responsability of classical publishing companies. Classical forms of publishing, however, which center around printed narrative articles, no longer seem well-suited in the digital age....

["Bioinformatics","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.78

Top subject areas - Articles & Preprints

Top subject areas - People

View all subject areas