Reliable IoT network traffic inference
Understanding and managing changes in IoT device behaviour to make network traffic predictions more reliable.
Understanding and managing changes in IoT device behaviour to make network traffic predictions more reliable.
Guest Post: How might a student cheat during a supervised in-person online exam in a BYOD environment?
Deprecating SHA-256, RSA, ECDSA, and ECDH key usage ahead of quantum computing?
Guest Post: An industry-academic analysis on trends in direct-path and reflection-amplification attacks to encourage greater common understanding of the DDoS landscape.
Here are APNIC Blog’s top three posts related to security for 2024.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2024’s best.
In 2024, George Michaelson touched on topics ranging from news to explainers. Here are three of George’s best.
Three of the best Guest Posts of 2024.
Guest Post: Do authoritative nameservers and resolvers follow best practices for NSEC3 settings?
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.