Results 1 to 10 of about 46,848 (253)
A distributed SDN-based intrusion detection system for IoT using optimized forests. [PDF]
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion detection in this network also increases, and the need for new and architecture-specific intrusion detection systems (IDS) is felt.
Ke Luo
doaj +4 more sources
Delay-tolerant networking (DTN) enables communication in disruptive scenarios where issues such as sparse and intermittent connectivity, long and variable delays, high latency, high error rates, or no end-to-end connectivity exist.
Catarina Nabais +2 more
doaj +1 more source
An Integral Cybersecurity Approach Using a Many-Objective Optimization Strategy
Data networks and computing devices have experienced exponential growth. Within a short span of time, they have opened new digital frontiers while also bringing forth new threats.
Omar Salinas +3 more
doaj +1 more source
A UAV-Assisted Stackelberg Game Model for Securing loMT Healthcare Networks
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients’ health and provide reliable medical services, especially in remote and underserved areas.
Jamshed Ali Shaikh +7 more
doaj +1 more source
Tracing astrophysical black hole seeds and primordial black holes with LISA-Taiji network
ABSTRACT In this work, we discuss the improvement that the joint network of LISA and Taiji could provide on exploring two kinds of black hole formation mechanisms. For astrophysical origin, we consider light seed and heavy seed scenarios, and generate populations accordingly.
Yuchan Yang +4 more
openaire +2 more sources
Tensor network and a black hole [PDF]
A tensor network formalism of thermofield dynamics is introduced. The formalism relates the original Hilbert space with its tilde space by a product of two copies of a tensor network. Then, their interface becomes an event horizon, and the logarithm of the tensor rank corresponds to the black hole entropy.
Matsueda, Hiroaki +2 more
openaire +2 more sources
Entanglement, tensor networks and black hole horizons [PDF]
We elaborate on a previous proposal by Hartman and Maldacena on a tensor network which accounts for the scaling of the entanglement entropy in a system at a finite temperature. In this construction, the ordinary entanglement renormalization flow given by the class of tensor networks known as the Multi Scale Entanglement Renormalization Ansatz (MERA ...
Molina-Vilaplana, J., Prior, J.
openaire +3 more sources
Software Defined Networking (SDN) presents a tremendous opportunity for developing abstract management of network updates. However, network updates introduce challenges in terms of consistency. Many consistent update algorithms are proposed for Ethernet,
Jun Lu +4 more
doaj +1 more source
Detection and Localization of Network Black Holes [PDF]
Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fault monitoring capabilities that are built into today's IP protocols and routers.
R. R. Kompella +3 more
openaire +1 more source
Probing black hole microstate evolution with networks and random walks [PDF]
We model black hole microstates and quantum tunneling transitions between them with networks and simulate their time evolution using well-established tools in network theory. In particular, we consider two models based on Bena-Warner three-charge multi-centered microstates and one model based on the D1-D5 system; we use network theory methods to ...
Charles, Anthony M., Mayerson, Daniel R.
openaire +5 more sources

