Results 1 to 10 of about 1,755 (269)
A distributed SDN-based intrusion detection system for IoT using optimized forests [PDF]
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion detection in this network also increases, and the need for new and architecture-specific intrusion detection systems (IDS) is felt.
Ke Luo
doaj +4 more sources
Tensor network and a black hole [PDF]
A tensor network formalism of thermofield dynamics is introduced. The formalism relates the original Hilbert space with its tilde space by a product of two copies of a tensor network. Then, their interface becomes an event horizon, and the logarithm of the tensor rank corresponds to the black hole entropy.
Hiroaki Matsueda +2 more
openalex +4 more sources
Black Hole Search in the Network and Subway Models
In this thesis we look at mobile agent solutions to black hole search and related problems. Mobile agents are computational entities that are autonomous, mobile, and can interact with their environment and each other. The black hole search problem is for a team of these agents to work together to map or explore a graph-like network environment where ...
Paola Flocchini +3 more
openalex +3 more sources
A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks
Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain.
Shree Om, Francis Joseph Ogwu
openalex +3 more sources
Delay-tolerant networking (DTN) enables communication in disruptive scenarios where issues such as sparse and intermittent connectivity, long and variable delays, high latency, high error rates, or no end-to-end connectivity exist.
Catarina Nabais +2 more
doaj +1 more source
An Integral Cybersecurity Approach Using a Many-Objective Optimization Strategy
Data networks and computing devices have experienced exponential growth. Within a short span of time, they have opened new digital frontiers while also bringing forth new threats.
Omar Salinas +3 more
doaj +1 more source
A UAV-Assisted Stackelberg Game Model for Securing loMT Healthcare Networks
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients’ health and provide reliable medical services, especially in remote and underserved areas.
Jamshed Ali Shaikh +7 more
doaj +1 more source
Tracing astrophysical black hole seeds and primordial black holes with LISA-Taiji network
ABSTRACT In this work, we discuss the improvement that the joint network of LISA and Taiji could provide on exploring two kinds of black hole formation mechanisms. For astrophysical origin, we consider light seed and heavy seed scenarios, and generate populations accordingly.
Yuchan Yang +4 more
openaire +2 more sources
Entanglement, tensor networks and black hole horizons [PDF]
We elaborate on a previous proposal by Hartman and Maldacena on a tensor network which accounts for the scaling of the entanglement entropy in a system at a finite temperature. In this construction, the ordinary entanglement renormalization flow given by the class of tensor networks known as the Multi Scale Entanglement Renormalization Ansatz (MERA ...
Molina-Vilaplana, J., Prior, J.
openaire +3 more sources
Detection and Localization of Network Black Holes [PDF]
Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fault monitoring capabilities that are built into today's IP protocols and routers.
R. R. Kompella +3 more
openaire +1 more source

