FITNESS-Research-Lab / FIWARE_SecurityTestbedLinks
☆13Updated last year
Alternatives and similar repositories for FIWARE_SecurityTestbed
Users that are interested in FIWARE_SecurityTestbed are comparing it to the libraries listed below
Sorting:
- Deadline countdowns for academic conferences in Security and Privacy☆786Updated this week
- ☆14Updated 2 years ago
- Include a simple Lab with InBand Network Telemetry and P4 for students and researchers☆10Updated last year
- Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries☆25Updated 3 years ago
- Extension of P4 language tutorials☆12Updated 5 years ago
- Using the ns-3 simulator to implement wireless nodes of blockchain and analyse its performance in terms of transaction throughput, mining…☆13Updated 5 years ago
- ☆13Updated 3 years ago
- A 2-4h workshop on the Tamarin protocol verifier.☆22Updated 6 months ago
- ☆19Updated last year
- A set of exercises for getting started with the Tamarin prover☆20Updated 2 years ago
- Mininet-based NDN emulator (mailing list: https://www.lists.cs.ucla.edu/mailman/listinfo/mini-ndn)☆77Updated last month
- ☆17Updated last year
- VM for the SDN class at Polimi☆19Updated last year
- IoT-Flock is an open-source tool for IoT Traffic Generation which supports the two widely used IoT Application Layer Protocols, i.e., MQT…☆31Updated 5 years ago
- Traffic Classification using Logistic Regression and K-Means Clustering.☆30Updated 5 years ago
- A curated list of open-source projects that help exploit Intel SGX technology☆417Updated last month
- Xilinx Blockchain Machine for Hyperledger Fabric.☆14Updated 2 years ago
- Efficient Dynamic Proof of Retrievability☆15Updated last year
- A curated list of SGX code and resources.☆244Updated last year
- ☆19Updated 5 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- A library OS for Linux multi-process applications, with Intel SGX support☆725Updated last week
- Confidential Computing Zoo provides confidential computing solutions based on Intel SGX, TDX, HEXL, etc. technologies.☆340Updated 2 weeks ago
- On the TOCTOU Problem in Remote Attestation☆15Updated last year
- Notebooks and Exercises for Network Security and Cryptography☆16Updated last year
- A demonstration codebase for the routing anomaly detection system featured in the USENIX Security 2024 paper, Learning with Semantics: To…☆27Updated 7 months ago
- Defined-trust Communications Toolkit for secure multicast transport☆13Updated this week
- A list of the state of IETF protocols and PQC☆73Updated 5 months ago
- The Westermo network traffic dataset☆24Updated 2 years ago
- Confidential Computing Consortium Governance Documents☆81Updated 2 weeks ago