-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
94 additions
and
14 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,14 +1,94 @@ | ||
@article{Beck2016Visual, | ||
abstract = {Bibiographic data such as collections of scientific articles and citation networks have been studied extensively in information visualization and visual analytics research. Powerful systems have been built to support various types of bibliographic analysis, but they require some training and cannot be used to disseminate the insights gained. In contrast, we focused on developing a more accessible visual analytics system, called SurVis, that is ready to disseminate a carefully surveyed literature collection. The authors of a survey may use our Web-based system to structure and analyze their literature database. Later, readers of the survey can obtain an overview, quickly retrieve specific publications, and reproduce or extend the original bibliographic analysis. Our system employs a set of selectors that enable users to filter and browse the literature collection as well as to control interactive visualizations. The versatile selector concept includes selectors for textual search, filtering by keywords and meta-information, selection and clustering of similar publications, and following citation links. Agreement to the selector is represented by word-sized sparkline visualizations seamlessly integrated into the user interface. Based on an analysis of the analytical reasoning process, we derived requirements for the system. We developed the system in a formative way involving other researchers writing literature surveys. A questionnaire study with 14 visual analytics experts confirms that SurVis meets the initially formulated requirements.}, | ||
author = {Beck, Fabian and Koch, Sebastian and Weiskopf, Daniel}, | ||
doi = {10.1109/TVCG.2015.2467757}, | ||
journal = {IEEE Transactions on Visualization and Computer Graphics}, | ||
keywords = {type:system, visual_analytics, sparklines, information_retrieval, clustering, literature_browser}, | ||
number = {01}, | ||
publisher = {IEEE}, | ||
volume = {22}, | ||
series = {TVCG}, | ||
title = {Visual Analysis and Dissemination of Scientific Literature Collections with {SurVis}}, | ||
url = {http://www.visus.uni-stuttgart.de/uploads/tx_vispublications/vast15-survis.pdf}, | ||
year = {2016} | ||
} | ||
@InProceedings{10.1007/978-3-030-35055-0_7, | ||
author="Bui, Thanh | ||
and Rao, Siddharth | ||
and Antikainen, Markku | ||
and Aura, Tuomas", | ||
editor="Askarov, Aslan | ||
and Hansen, Ren{\'e} Rydhof | ||
and Rafnsson, Willard", | ||
title="Client-Side Vulnerabilities in Commercial VPNs", | ||
booktitle="Secure IT Systems", | ||
year="2019", | ||
publisher="Springer International Publishing", | ||
address="Cham", | ||
pages="103--119", | ||
abstract="Internet users increasingly rely on commercial virtual private network (VPN) services to protect their security and privacy. The VPN services route the client's traffic over an encrypted tunnel to a VPN gateway in the cloud. Thus, they hide the client's real IP address from online services, and they also shield the user's connections from perceived threats in the access networks. In this paper, we study the security of such commercial VPN services. The focus is on how the client applications set up VPN tunnels, and how the service providers instruct users to configure generic client software. We analyze common VPN protocols and implementations on Windows, macOS and Ubuntu. We find that the VPN clients have various configuration flaws, which an attacker can exploit to strip off traffic encryption or to bypass authentication of the VPN gateway. In some cases, the attacker can also steal the VPN user's username and password. We suggest ways to mitigate each of the discovered vulnerabilities.", | ||
isbn="978-3-030-35055-0" | ||
} | ||
@inproceedings{ramesh2022vpnalyzer, | ||
title={VPNalyzer: systematic investigation of the VPN ecosystem}, | ||
author={Ramesh, Reethika and Evdokimov, Leonid and Xue, Diwen and Ensafi, Roya}, | ||
booktitle={Network and Distributed System Security}, | ||
volume={10}, | ||
year={2022} | ||
} | ||
@article{abdulazeez2020comparison, | ||
title={Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol}, | ||
author={Abdulazeez, Adnan and Salim, Baraa and Zeebaree, Diyar and Doghramachi, Dana}, | ||
year={2020}, | ||
publisher={International Association of Online Engineering} | ||
} | ||
@inproceedings{wilson2020investigation, | ||
title={Investigation into the security and privacy of iOS VPN applications}, | ||
author={Wilson, Jack and McLuskie, David and Bayne, Ethan}, | ||
booktitle={Proceedings of the 15th International Conference on Availability, Reliability and Security}, | ||
pages={1--9}, | ||
year={2020} | ||
} | ||
@inproceedings{lackorzynski2019comparative, | ||
title={A comparative study on virtual private networks for future industrial communication systems}, | ||
author={Lackorzynski, Tim and K{\"o}psell, Stefan and Strufe, Thorsten}, | ||
booktitle={2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)}, | ||
pages={1--8}, | ||
year={2019}, | ||
organization={IEEE} | ||
} | ||
@inproceedings{khan2018empirical, | ||
title={An empirical analysis of the commercial vpn ecosystem}, | ||
author={Khan, Mohammad Taha and DeBlasio, Joe and Voelker, Geoffrey M and Snoeren, Alex C and Kanich, Chris and Vallina-Rodriguez, Narseo}, | ||
booktitle={Proceedings of the Internet Measurement Conference 2018}, | ||
pages={443--456}, | ||
year={2018} | ||
} | ||
@inproceedings{wu2019performance, | ||
title={Performance evaluation of VPN with different network topologies}, | ||
author={Wu, Zheng and Xiao, Mingzhong}, | ||
booktitle={2019 IEEE 2nd International Conference on Electronics Technology (ICET)}, | ||
pages={51--55}, | ||
year={2019}, | ||
organization={IEEE} | ||
} | ||
@article{abbas2023security, | ||
title={Security Assessment and Evaluation of VPNs: A Comprehensive Survey}, | ||
author={Abbas, Haider and Emmanuel, Naina and Amjad, Muhammad Faisal and Yaqoob, Tahreem and Atiquzzaman, Mohammed and Iqbal, Zafar and Shafqat, Narmeen and Shahid, Waleed Bin and Tanveer, Ali and Ashfaq, Umer}, | ||
journal={ACM Computing Surveys}, | ||
volume={55}, | ||
number={13s}, | ||
pages={1--47}, | ||
year={2023}, | ||
publisher={ACM New York, NY} | ||
} | ||
@inproceedings{jahan2017application, | ||
title={Application specific tunneling protocol selection for Virtual Private Networks}, | ||
author={Jahan, Sohely and Rahman, Md Saifur and Saha, Sajeeb}, | ||
booktitle={2017 international conference on networking, systems and security (nsyss)}, | ||
pages={39--44}, | ||
year={2017}, | ||
organization={IEEE} | ||
} | ||
@article{ajiya2019performance, | ||
title={Performance evaluation of IPSEC-VPN on debian linux environment}, | ||
author={Ajiya, AA and Idriss, US and Jerome, MG}, | ||
journal={International Journal of Computer Applications}, | ||
volume={975}, | ||
pages={8887}, | ||
year={2019} | ||
} |