• 《中国科学引文数据库(CSCD)》
  • 日本科学技术振兴机构数据库(JST)
  • 中国科技学术期刊开放平台
  • 《中国学术期刊(光盘版)全文(CNKI)》
  • 《中国核心期刊(遴选)数据库》
  • 中国超星期刊域出版平台
  • 《中国学术期刊综合评价数据库》
  • 中国科学引文数据库(CSCD)
  • 中国核心期刊(遴选)数据库
  • 日本科学技术振兴机构数据库(JST)
  • 中国学术期刊(网络版)(CNKI)
  • 中国学术期刊综合评价数据库(CAJCED)

论文  全文  图  表  新闻 

  • About Journal
  • Online First
  • Current Issue
  • Advance Search
  • Editorial Board
  • Submission Guidelines
  • Ethics Statement

GNSS World of China

  • Share facebook twitter google linkedin

The research verification and application prospect of AIS-based BDS differential data broadcast system

Doi:  doi:10.13442/j.gnss.1008-9268.2019.06.007.

  • SHEN Jianjun 1 , 
  • PANG Bobo 2 , 
  • LU Hongyang 2 , 
  • YU Yuan 2 ,  , 
  • WANG Wenliang

Changjiang River Administration of Communication Affairs, MOT, Wuhan 430014, China

China Transport Telecommunication & Information Center, Beijing 100011, China

China Aerospace Science and Technology Corporation, Beijing 100095, China

  • Publish Date: 2019-12-15
  • BDS , 
  • AIS , 
  • differential data , 
  • message 17 , 
  • application of AIS-based BDS

Proportional views

通讯作者: 陈斌, [email protected].

沈阳化工大学材料科学与工程学院 沈阳 110142

Article Metrics

  • PDF Downloads( 86 )
  • Abstract views( 416 )
  • HTML views( 68 )

Copyright © 2009《 GNSS World of China 》 Editorial Office

Address:84 Jianshe Dong Lu, Muye District, Xinxiang City, Henan Province, China China Pos:453000 Tel:0373-3712411 Fax:0373-3052232 Email: [email protected]

Export File

How to find the Article Influence Score (AIS)

The university database of publication activities offers an excellent tool to search for citation indexes of specific journals.

The link is here: https://eso.vse.cz/~sklenak/pcvse/pcvse-casopisy.php (there is a button to switch to English in the upper part of the page).

Important metrics (AIS, SJR, quartile) are illustrated below.

research type bds ais tls nic

  • Science and Research at FBA About the Center Scientific Board of the Faculty Ethics Committee for Research
  • For Employees and Ph.D. Students Research Support Activities Research Projects Database of publications Miscellaneous
  • For MSc. Students Research Methods – Team Mentors
  • Links for the current user InSIS Microsoft 365 Moodle VŠE Intranet

The websites of the Prague University of Economics and Business use cookies to optimize their content and services provided. Please give us your consent to use of them.

Select the services for which you want to allow the use of cookies:

Skip to Main Landmark (Press Enter)

Spartan Alert

research type bds ais tls nic

The Arts. Humanities. Social Sciences. Natural Sciences. Mathematics.

With more than 20 departments and 200+ programs, the College of Arts & Sciences (CAS) is the largest and most diverse academic unit at UNCG.

two male scientists work on plants

Find Your Fit

Choose from over 250 degrees and concentrations — from pre-med to interior architecture.

two people engaged in conversation in front of a blackboard.


Need help registering? Have questions about transferring? Our advising office is ready to help.

hot pink blooming azaleas in the foreground with the brick Foust building in the background and a clear blue sky.

plan your degree

Learn about easy course selection & registration, as well as how to monitor your degree progress.

RIGorous academics

The College of Arts & Sciences is dedicated to providing a rigorous liberal arts education.

Learn more about CAS by the numbers:

Programs of study

It’s easy to find the right fit.


Join world-renowned faculty in cutting-edge research.

With 32% of the student body, we’re the largest of UNCG’s colleges and schools.

full-time faculty

Award-winning educators and researchers leave a lifelong impact.

research type bds ais tls nic

Top-ranked programs

Ma sociology – criminology, english phd, online philosophy ba.

red haired girl in cap and gown speaks at podium


UNC Greensboro is ranked #1 in the state for social mobility, meaning our graduates go further. In CAS, we are guiding the next generation of doctors, educators, therapists, scientists, creators, and business leaders who are making a remarkable real-world impact.


Work on an archaeological dig. Excavate literary archives. Search for cancer-fighting compounds in fungi.

A hallmark of the UNCG experience is the opportunity to engage in hands-on research with faculty experts — as a graduate or undergraduate student.

research type bds ais tls nic


UNCG’s quality academic experience is now available to a growing number of remote learners.

Improve your credentials with a bachelor’s, master’s, or certificate program — completed on your own time and from your own home.

CAS Headlines

2024 Goldwater Scholar Marcos Tapia

April 12, 2024

Opportunity Meets Initiative for UNCG’s Goldwater Scholar

AADS students stand in front of the site of the 1960 Woolworth lunch counter sit-ins in Greensboro.

April 8, 2024

AADS Receives Mellon Grant for Equity-Based Educational Programs

Three UNCG students converse in hallway with Professor Robin Maxwell

April 3, 2024


Rising up: how islam played a role in resistance to enslavement.

Mark your calendars for April 15th! We’re diving into the fascinating topic of “Rising Up:…

Believe in The G

Believe in the G is UNCG’s biggest annual day of giving. Each year, Spartans from…

Indian Ocean Winds Movement Workshop

On April 17th, the Department of African American & African Diaspora Studies will be hosting…

Helen Barton Lecture Series: Suzanne Lenhart

Join the Department of Mathematics and Statistics for this lecture entitled, “Natural System Management: A…

Populism, Illiberalism, and Violent Extremism in the United States

Join us for this free lecture in UNC Greensboro’s 2023-24 Harriet Elliott Lecture Series, hosted…

Department of Chemistry and Biochemistry Seminar Speaker Series

Join the Chemistry and Biochemistry Departments on Fridays at 1 p.m. for their weekly seminar…

English Tea Talk with Dr. Jeanie Reynolds

Join us for the next installment of the University’s English Department Tea Talk series with…

“And Also the Ice Age Comes and Goes”

Professor Kerstin Radde-Antweiler explores climate change in relation to video games and gaming practices, analyzing…

CAS End-Of-Year Celebration

Faculty, staff, and friends of the College of Arts & Sciences (CAS) are invited to…

Digital Fiction Jam

On May 11th, come join UNCG’s first ever Digital Fiction Jam, where you can share…

View Full Calendar of Events

Stay Connected

View this profile on Instagram College of Arts & Sciences (@ uncg_cas ) • Instagram photos and videos
  • X (Twitter)
UNCG College of Arts & Sciences

research type bds ais tls nic

[email protected]


105 Foust Building P.O. Box 26170 Greensboro, NC 27402

Sign up for our newsletter

Report website errors

Analysis of TLS Prefiltering for IDS Acceleration

  • Conference paper
  • First Online: 10 March 2023
  • Cite this conference paper

Book cover

  • Lukas Sismis   ORCID: orcid.org/0000-0002-0685-2816 10 &
  • Jan Korenek   ORCID: orcid.org/0000-0002-4662-7349 11  

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13882))

Included in the following conference series:

  • International Conference on Passive and Active Network Measurement

1602 Accesses

Network intrusion detection systems (IDS) and intrusion prevention systems (IPS) have proven to play a key role in securing networks. However, due to their computational complexity, the deployment is difficult and expensive. Therefore, many times the IDS is not powerful enough to handle all network traffic on high-speed network links without uncontrolled packet drop. High-speed packet processing can be achieved using many CPU cores or an appropriate acceleration. But the acceleration has to preserve the detection quality and has to be flexible to handle ever-emerging security threats. One of the common acceleration methods among intrusion detection/prevention systems is the bypass of encrypted packets of the Transport Layer Security (TLS) protocol. This is based on the fact that IDS/IPS cannot match signatures in the packet encrypted payload. The paper provides an analysis and comparison of available TLS bypass solutions and proposes a high-speed encrypted TLS Prefilter for further acceleration. We are able to demonstrate that using our technique, the IDS performance has tripled and at the same time detection results have resulted in a lower rate of false positives . It is designed as a software-only architecture with support for commodity cards. However, the architecture allows smooth transfer of the proposed method to the HW-based solution in Field-programmable gate array (FPGA) network interface cards (NICs).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

https://suricata.readthedocs.io/en/latest/performance/ignoring-traffic.html#encrypted-traffic .

Scalable networking: eliminating the receive processing bottleneck-introducing RSS (2004)

Google Scholar  

Suricata and xdp (2019). https://www.slideshare.net/ennael/kernel-recipes-2019-suricata-and-xdp

Dridex malware traffic capture (2020). https://www.malware-traffic-analysis.net/2020/06/03/index.html

Introduction to eBPF and XDP support in suricata (2021). https://www.stamus-networks.com/hubfs/Library/Documents%20(PDFs)/StamusNetworks-WP-eBF-XDP-092021-1.pdf

TLS fingerprinting by JA3(s) method (2021). https://www.github.com/salesforce/ja3

DPDK support in suricata (2022). https://www.suricata.readthedocs.io/en/latest/configu ration/suricata-yaml.html#data-plane-development-kit-dpdk

Emerging threats open ruleset official webpage (2022). https://www.rules.emergingthreats.net/open/suricata/rules/

Snort official webpage (2022). https://www.snort.org/

SSL dynamic preprocessor (SSLPP) (2022). https://www.snort.org/faq/readme-ssl

Suricata official webpage (2022). https://www.suricata.io/

Zeek official webpage (2022). https://www.zeek.org/

Baker, Z.K., Prasanna, V.K.: High-throughput linked-pattern matching for intrusion detection systems. In: 2005 Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 193–202 (2005). https://doi.org/10.1145/1095890.1095918

Ceška, M., et al.: Deep packet inspection in FPGAs via approximate nondeterministic automata. In: 2019 IEEE 27th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 109–117 (2019). https://doi.org/10.1109/FCCM.2019.00025

González, J., Paxson, V., Weaver, N.: Shunting: A hardware/software architecture for flexible, high-performance network intrusion prevention, pp. 139–149 (2007). https://doi.org/10.1145/1315245.1315264

Jamshed, M.A., et al.: Kargus: a highly-scalable software-based intrusion detection system. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 317–328. CCS 2012, Association for Computing Machinery, New York, NY, USA (2012). https://doi.org/10.1145/2382196.2382232

Kučera, J., Kekely, L., Piecek, A., Kořenek, J.: General ids acceleration for high-speed networks. In: 2018 IEEE 36th International Conference on Computer Design (ICCD), pp. 366–373 (2018). https://doi.org/10.1109/ICCD.2018.00062

Mitra, A., Najjar, W., Bhuyan, L.: Compiling PCRE to FPGA for accelerating snort IDS. In: Proceedings of the 3rd ACM/IEEE Symposium on Architecture for Networking and Communications Systems, pp. 127–136. ANCS 2007, Association for Computing Machinery, New York, NY, USA (2007). https://doi.org/10.1145/1323548.1323571

Song, H., Sproull, T., Attig, M., Lockwood, J.: Snort Offloader: a reconfigurable hardware NIDS filter. In: International Conference on Field Programmable Logic and Applications, pp. 493–498 (2005). https://doi.org/10.1109/FPL.2005.1515770

Stoffer, V., Sharma, A., Krous, J.: 100G Intrusion Detection, August 2015. https://www.cspi.com/wp-content/uploads/2016/09/Berkeley-100GIntrusionDetection.pdf . Accessed 27 May 2022

Weaver, N., Paxson, V., Gonzalez, J.M.: The shunt: an FPGA-based accelerator for network intrusion prevention. In: Proceedings of the 2007 ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays, pp. 199–206. FPGA 2007, Association for Computing Machinery, New York, NY, USA (2007). https://doi.org/10.1145/1216919.1216952

Woo, S., Park, K.: Scalable TCP session monitoring with symmetric receive-side scaling (2012)

Zhao, Z., Sadok, H., Atre, N., Hoe, J.C., Sekar, V., Sherry, J.: Achieving 100Gbps intrusion prevention on a single server. In: 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pp. 1083–1100. USENIX Association (2020). https://www.usenix.org/conference/osdi20/presentation/zhao-zhipeng

Šišmiš, L.: Optimization of the Suricata IDS/IPS, Master’s thesis, Faculty of Information Technology (FIT), Brno, Czech Republic (2021)

Download references

Author information

Authors and affiliations.

CESNET, Generála Píky 430/26, Prague, 16000, Czech Republic

Lukas Sismis

Faculty of Information Technology, Brno University of Technology, Bozetechova 2/1, 61200, Brno, Czech Republic

Jan Korenek

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Lukas Sismis .

Editor information

Editors and affiliations.

Karlstad University, Karlstad, Sweden

Anna Brunstrom

Edgio, Scottsdale, AZ, USA

Marcel Flores

IMDEA Networks Institute, Madrid, Spain

Marco Fiore

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Sismis, L., Korenek, J. (2023). Analysis of TLS Prefiltering for IDS Acceleration. In: Brunstrom, A., Flores, M., Fiore, M. (eds) Passive and Active Measurement. PAM 2023. Lecture Notes in Computer Science, vol 13882. Springer, Cham. https://doi.org/10.1007/978-3-031-28486-1_5

Download citation

DOI : https://doi.org/10.1007/978-3-031-28486-1_5

Published : 10 March 2023

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-28485-4

Online ISBN : 978-3-031-28486-1

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Educational Membership icon

  • New! Member Benefit New! Member Benefit
  • Featured Analytics Hub
  • Resources Resources
  • Member Directory
  • Networking Communities
  • Advertise, Exhibit, Sponsor
  • Find or Post Jobs

Connect Icon

  • Learn and Engage Learn and Engage
  • Bridge Program

research type bds ais tls nic

  • Compare AACSB-Accredited Schools
  • Explore Programs

Bullseye mission icon

  • Advocacy Advocacy
  • Featured AACSB Announces 2024 Class of Influential Leaders
  • Diversity, Equity, Inclusion, and Belonging
  • Influential Leaders
  • Innovations That Inspire
  • Connect With Us Connect With Us
  • Accredited School Search
  • Accreditation
  • Learning and Events
  • Advertise, Sponsor, Exhibit
  • Tips and Advice
  • Is Business School Right for Me?

Available Data

Through annual surveys, DataDirect captures information from business schools in a variety of areas.  

  • Degrees conferred
  • Graduating student employment (including job acceptance rates, starting salaries, and bonuses)
  • Business unit characteristics
  • Mission statements
  • Average class size
  • Student, staff, and faculty demographics
  • Faculty and staff salary
  • Program offerings (including delivery method and tuition)

AACSB Analytics Hub

Leverage and interact with the largest source of business school data with the AACSB Analytics Hub , a powerful tool for decision making, exclusively for AACSB educational and sustaining business members.

  • Unlimited use of the Comparison Group tool for generating school sets
  • Access to the complete Innovations That Inspire collection
  • Access to select complementary reports
  • From the home screen, click Request Additional Access
  • Select the download
  • Click Submit Access Request
  • Once approved, return to the Publications section to access the report
  • Quick Reports : feature commonly requested data points
  • Quick Exports : generate reports that span multiple years on a data set of your choice
  • Report Writer : choose up to 20 variables for use with custom comparison groups. The data can be listed as either complete (per school) or summary (aggregate) depending on the confidentiality of the variables selected.
  • Tables and Graphs : choose a single variable to see the mean/median values for that variable across multiple years and view your results in data table or graph form. Select an aggregate number in these tables to view a sorted list for the data used in creating that data point.
  • Sorted Lists : choose a single variable to view individual data points. Non-confidential variables are listed per school; individual data points will not be identified by school for any confidential variables.
  • Slideshows : for benchmarking items that you plan to use more than once, store commonly used or interesting benchmarking results in slide-shows housed in DataDirect for later use.
  • Custom Variables : calculate your own custom variables using existing variables and basic mathematical calculations. Once created, these can be used in any variable-based benchmarking tool.
  • Crosstabs and Frequencies : choose single or multiple variables for frequency tables with the option to include a crosstab variable.

Featured Insights

Data Report Icon

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.


Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations

Download paper, additional citation formats.

  • Google Scholar


  1. A buffer descriptor queue consisting of three BDs located in the memory

    research type bds ais tls nic

  2. EGNOS-based AIS centralized architecture Central Facility: The

    research type bds ais tls nic

  3. What is TLS encryption and how does it work?

    research type bds ais tls nic

  4. PPT

    research type bds ais tls nic

  5. What is a TLS/SSL certificate, and how does it work?

    research type bds ais tls nic

  6. SSL/TLS Offloading, Encryption, and Certificates with NGINX

    research type bds ais tls nic


  1. 2 Maret 2024

  2. OB43❗ Drag Headshot Obb Config‼️Mt Manager Config File‼️Freefire Obb Headshot File☑️ Today Config

  3. Hara Hara Shambho Video Song

  4. TCS 15M ANALYSIS FOR 15/03/24#trading #fyers #stockmarket #tradingview

  5. Google's LUMIERE AI Video Generation Has Everyone Stunned

  6. Opuszczony OŚRODEK KOLONIJNY nad Jeziorem "Na Żywo" @UrbexChorzow@ObrazyPrzeszlosci #Urbex


  1. PDF Brandon Randolph-Seng, Ph.D.

    Category BDS AIS TLS Total Articles in Refereed Journals 11 7 18 Books, Monographs, Compilations, Manuals, Supplements, Chapters, Cases, Readings 1 1 2 ... Organizations, Emerald Publishing. [Type: Award] [Category: Research] [Status: Received] 2018-2019: TAMUC Research, Scholarship, and Creative Activities Award Ceaseless Industry, Texas A&M ...

  2. The research verification and application prospect of AIS-based BDS

    With respect to the situation that present Automatic Identification System (AIS) does not support the broadcast of BDS differential data, this paper studies differential message transmission and communication protocol of AIS, proposes a solution to broadcast BDS differential data through AIS. A test demonstration system is built to verify, verifies the feasibility of AIS-based BDS differential ...

  3. PDF Dan Li, Ph.D. Assistant Professor Management School of Business

    Category BDS AIS TLS Total Articles in Refereed Journals 1 1 Articles-in-Progress (All) 4 4 Publications in Refereed Conference Proceedings 3 3 ... (National). Invited by SAGE Publishing to feature in Research Methods Video streaming collection on Marketing Research; the video collection will be published in 2020. Reviewer: Conference Paper

  4. PDF Annetta Fortune, Ph.D.

    Category BDS AIS TLS Total Articles in Refereed Journals 6 6 Articles-in-Progress (All) 2 2 Publications of Non-refereed or Invited Papers 1 1 Books, Monographs, Compilations, Manuals, Supplements, Chapters, Cases, Readings 2 2 Presentations of Refereed Papers 5 5 Refereed Articles

  5. PDF Nicholas Huntington-Klein, Ph.D

    Category BDS AIS TLS Total Articles in Refereed Journals 13 13 Articles -in-Progress (All) 7 7 Publications of Non -refereed or Invited Papers ... Predictive Validity of Teacher Selection Tools., submitted to Center for Education Data and Research. Grants : Research : 2016: Huntington-Klein, N. Jr/Sr Grant, Principal Investigator, California ...

  6. Abnormal Ship Behavior Detection Based on AIS Data

    For the second part, there were two phases: (1) the extraction of maritime routes based on AIS data and (2) the detection of abnormal behavior for ships using spatial attributes based on Rayda's criterion. For the third part, there were two phases: (1) nearest route matching and (2) the detection and scoring of the abnormal behavior ...

  7. Design of BDS Differential Positioning System Based on AIS

    The results show that the longer the baseline length is, the poorer positioning accuracy gets, and the positioning accuracy decline rate of the BDS B3 signal is higher than that of the BDS B1 ...

  8. Secure AIS with Identity-Based Authentication and Encryption

    The Automatic Identification System (AIS) offers automatic traffic control and collision avoidance services to the maritime transportation sector worldwide. Because AIS lacks security mechanisms ...

  9. Guidelines for the Selection, Configuration, and Use of Transport Layer

    Abstract Transport Layer Security (TLS) provides mechanisms to protect sensitive data during electronic dissemination across the Internet. This Special Publication provides guidance to the selection and configuration of TLS protocol implementations while making effective use of Federal Information Processing Standards (FIPS) and NIST-recommended cryptographic algorithms, and requires that TLS ...

  10. PDF On the Security of the TLS Protocol: A Systematic Analysis

    1 IBM Research 2 Royal Holloway, University of London 3 George Washington University Abstract. TLS is the most widely-used cryptographic protocol on the Internet. It comprises the TLS Handshake Protocol, responsible for authentication and key establishment, and the TLS Record Protocol, which takes care of subsequent use of those keys to protect ...

  11. PDF 2019 Research Impact Report

    2019 Research Impact Report - The University of Southern Mississippi

  12. PDF 2013 Eligibility Procedures and Accreditation Standards for ...

    First, the eligibility criteria specify a series of core values that AACSB believes are important. Schools must demonstrate a commitment to and alignment with these values in order to achieve and continue AACSB accreditation. Second, these criteria provide a foundation for accreditation by defining the scope of review.

  13. Credibility Monitoring Research of BDS Based on LEO/INS

    The simulation results show that LEO/INS-aided system can detect and recognize fault satellites in more than one directions. Under the indexes of 90% integrity default detection rate and recognition rate, compared with single BDS system, the two indexes of the INS-aided system improve about 20% and 40% respectively.

  14. Research on Fusion Algorithm of Beidou and AIS Based on Improved

    Based on the AIS/BDS information fusion of the improved federated Kalman filter, the Beidou. navigation and positioning system is used to assist the AIS pos itioning system, which overcomes the ...

  15. Research on Broadcasting of Beidou Differential Information Based on AIS

    Abstract. BeiDou differential information is an important part of BeiDou satellite navigation system application. Based on AIS, it can broadcast BeiDou differential information. It can provide social users with precision navigation positioning services from the centimeter level to the meter level, and increase the Beidou navigation system ...

  16. How to find the Article Influence Score (AIS)

    How to find the Article Influence Score (AIS) The university database of publication activities offers an excellent tool to search for citation indexes of specific journals. ... Research Support Activities Research Projects Database of publications Miscellaneous. For MSc. Students. Research Methods - Team Mentors.

  17. College of Arts & Sciences

    RESEARCH FUNDING. Join world-renowned faculty in cutting-edge research. 6,000+ STUDENTS. With 32% of the student body, we're the largest of UNCG's colleges and schools. 400+ full-time faculty. Award-winning educators and researchers leave a lifelong impact. Top-ranked programs #1.

  18. PDF Request to Add Journal Articles/Conference Presentations to Sedona

    5/8/17 chb . Request to Add Journal Articles/Conference Presentations to Sedona Faculty Profiles . All fields must be complete prior to submission to departmental office.

  19. PDF College of Business and Management Table 8-1: Intellectual

    Types of Intellectual Contributions Percentages of Faculty Producing Intellectual Contributions Peer/Editor-Reviewed Department BDS AIS TLS Total PRJ APR/ER All Other Total Part All Accounting, Business Law & Finance [ABF] [23 members, 17.75 FTE] 2.00 43.00 7.00 52.00 26.00 26.00 52.00 60.00 % 50.70 % Management & Marketing

  20. Analysis of TLS Prefiltering for IDS Acceleration

    We provide 3 different views on the captured datasets displayed in Fig. 1, where the figures present the ratio of TLS and non-TLS traffic based on different metrics.Figure 1a is based on the number of bytes, Fig. 1b on the number of packets, and Fig. 1c on the number of flows. Figures containing byte and packet analysis (1a and b) count towards the TLS group everything related to TLS protocol ...

  21. DataDirect

    The AACSB Data Glossary contains a list and descriptions of the types of data that AACSB collects. Data Reports Discover AACSB data reports with insights on business education trends. Data Requests Request data for news or other media at [email protected] Frequently Asked Questions What does DataDirect do? ...

  22. Guidelines for the Selection, Configuration, and Use of Transport Layer

    Abstract Transport Layer Security (TLS) provides mechanisms to protect data during electronic dissemination across the Internet. This Special Publication provides guidance to the selection and configuration of TLS protocol implementations while making effective use of Federal Information Processing Standards (FIPS) and NIST-recommended cryptographic algorithms.

  23. Review on the Research and Applications of TLS in Ground Surface and

    With the gradual maturity of the terrestrial laser scanners (TLS) technology, it is widely used in the field of deformation monitoring due to its fast, automated, and non-contact data acquisition capabilities. The TLS technology has changed the traditional deformation monitoring mode which relies on single-point monitoring. This paper analyzes the application of TLS in deformation monitoring ...