Skip to content

Commit

Permalink
Update references.bib
Browse files Browse the repository at this point in the history
  • Loading branch information
yxwCS authored May 15, 2024
1 parent 04c3b8c commit 256140f
Showing 1 changed file with 94 additions and 14 deletions.
108 changes: 94 additions & 14 deletions survis/bib/references.bib
Original file line number Diff line number Diff line change
@@ -1,14 +1,94 @@
@article{Beck2016Visual,
abstract = {Bibiographic data such as collections of scientific articles and citation networks have been studied extensively in information visualization and visual analytics research. Powerful systems have been built to support various types of bibliographic analysis, but they require some training and cannot be used to disseminate the insights gained. In contrast, we focused on developing a more accessible visual analytics system, called SurVis, that is ready to disseminate a carefully surveyed literature collection. The authors of a survey may use our Web-based system to structure and analyze their literature database. Later, readers of the survey can obtain an overview, quickly retrieve specific publications, and reproduce or extend the original bibliographic analysis. Our system employs a set of selectors that enable users to filter and browse the literature collection as well as to control interactive visualizations. The versatile selector concept includes selectors for textual search, filtering by keywords and meta-information, selection and clustering of similar publications, and following citation links. Agreement to the selector is represented by word-sized sparkline visualizations seamlessly integrated into the user interface. Based on an analysis of the analytical reasoning process, we derived requirements for the system. We developed the system in a formative way involving other researchers writing literature surveys. A questionnaire study with 14 visual analytics experts confirms that SurVis meets the initially formulated requirements.},
author = {Beck, Fabian and Koch, Sebastian and Weiskopf, Daniel},
doi = {10.1109/TVCG.2015.2467757},
journal = {IEEE Transactions on Visualization and Computer Graphics},
keywords = {type:system, visual_analytics, sparklines, information_retrieval, clustering, literature_browser},
number = {01},
publisher = {IEEE},
volume = {22},
series = {TVCG},
title = {Visual Analysis and Dissemination of Scientific Literature Collections with {SurVis}},
url = {http://www.visus.uni-stuttgart.de/uploads/tx_vispublications/vast15-survis.pdf},
year = {2016}
}
@InProceedings{10.1007/978-3-030-35055-0_7,
author="Bui, Thanh
and Rao, Siddharth
and Antikainen, Markku
and Aura, Tuomas",
editor="Askarov, Aslan
and Hansen, Ren{\'e} Rydhof
and Rafnsson, Willard",
title="Client-Side Vulnerabilities in Commercial VPNs",
booktitle="Secure IT Systems",
year="2019",
publisher="Springer International Publishing",
address="Cham",
pages="103--119",
abstract="Internet users increasingly rely on commercial virtual private network (VPN) services to protect their security and privacy. The VPN services route the client's traffic over an encrypted tunnel to a VPN gateway in the cloud. Thus, they hide the client's real IP address from online services, and they also shield the user's connections from perceived threats in the access networks. In this paper, we study the security of such commercial VPN services. The focus is on how the client applications set up VPN tunnels, and how the service providers instruct users to configure generic client software. We analyze common VPN protocols and implementations on Windows, macOS and Ubuntu. We find that the VPN clients have various configuration flaws, which an attacker can exploit to strip off traffic encryption or to bypass authentication of the VPN gateway. In some cases, the attacker can also steal the VPN user's username and password. We suggest ways to mitigate each of the discovered vulnerabilities.",
isbn="978-3-030-35055-0"
}
@inproceedings{ramesh2022vpnalyzer,
title={VPNalyzer: systematic investigation of the VPN ecosystem},
author={Ramesh, Reethika and Evdokimov, Leonid and Xue, Diwen and Ensafi, Roya},
booktitle={Network and Distributed System Security},
volume={10},
year={2022}
}
@article{abdulazeez2020comparison,
title={Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol},
author={Abdulazeez, Adnan and Salim, Baraa and Zeebaree, Diyar and Doghramachi, Dana},
year={2020},
publisher={International Association of Online Engineering}
}
@inproceedings{wilson2020investigation,
title={Investigation into the security and privacy of iOS VPN applications},
author={Wilson, Jack and McLuskie, David and Bayne, Ethan},
booktitle={Proceedings of the 15th International Conference on Availability, Reliability and Security},
pages={1--9},
year={2020}
}
@inproceedings{lackorzynski2019comparative,
title={A comparative study on virtual private networks for future industrial communication systems},
author={Lackorzynski, Tim and K{\"o}psell, Stefan and Strufe, Thorsten},
booktitle={2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)},
pages={1--8},
year={2019},
organization={IEEE}
}
@inproceedings{khan2018empirical,
title={An empirical analysis of the commercial vpn ecosystem},
author={Khan, Mohammad Taha and DeBlasio, Joe and Voelker, Geoffrey M and Snoeren, Alex C and Kanich, Chris and Vallina-Rodriguez, Narseo},
booktitle={Proceedings of the Internet Measurement Conference 2018},
pages={443--456},
year={2018}
}
@inproceedings{wu2019performance,
title={Performance evaluation of VPN with different network topologies},
author={Wu, Zheng and Xiao, Mingzhong},
booktitle={2019 IEEE 2nd International Conference on Electronics Technology (ICET)},
pages={51--55},
year={2019},
organization={IEEE}
}
@article{abbas2023security,
title={Security Assessment and Evaluation of VPNs: A Comprehensive Survey},
author={Abbas, Haider and Emmanuel, Naina and Amjad, Muhammad Faisal and Yaqoob, Tahreem and Atiquzzaman, Mohammed and Iqbal, Zafar and Shafqat, Narmeen and Shahid, Waleed Bin and Tanveer, Ali and Ashfaq, Umer},
journal={ACM Computing Surveys},
volume={55},
number={13s},
pages={1--47},
year={2023},
publisher={ACM New York, NY}
}
@inproceedings{jahan2017application,
title={Application specific tunneling protocol selection for Virtual Private Networks},
author={Jahan, Sohely and Rahman, Md Saifur and Saha, Sajeeb},
booktitle={2017 international conference on networking, systems and security (nsyss)},
pages={39--44},
year={2017},
organization={IEEE}
}
@article{ajiya2019performance,
title={Performance evaluation of IPSEC-VPN on debian linux environment},
author={Ajiya, AA and Idriss, US and Jerome, MG},
journal={International Journal of Computer Applications},
volume={975},
pages={8887},
year={2019}
}

0 comments on commit 256140f

Please sign in to comment.