Results 1 to 10 of about 1,755 (269)

A distributed SDN-based intrusion detection system for IoT using optimized forests [PDF]

open access: yesPLoS ONE, 2023
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion detection in this network also increases, and the need for new and architecture-specific intrusion detection systems (IDS) is felt.
Ke Luo
doaj   +4 more sources

Tensor network and a black hole [PDF]

open access: greenPhysical Review D, 2013
A tensor network formalism of thermofield dynamics is introduced. The formalism relates the original Hilbert space with its tilde space by a product of two copies of a tensor network. Then, their interface becomes an event horizon, and the logarithm of the tensor rank corresponds to the black hole entropy.
Hiroaki Matsueda   +2 more
openalex   +4 more sources

Black Hole Search in the Network and Subway Models

open access: green, 2012
In this thesis we look at mobile agent solutions to black hole search and related problems. Mobile agents are computational entities that are autonomous, mobile, and can interact with their environment and each other. The black hole search problem is for a team of these agents to work together to map or explore a graph-like network environment where ...
Paola Flocchini   +3 more
openalex   +3 more sources

A Proposal for Mitigating Multiple Black-Hole Attack in Wireless Mesh Networks

open access: diamond, 2013
Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain.
Shree Om, Francis Joseph Ogwu
openalex   +3 more sources

BiRep: A Reputation Scheme to Mitigate the Effects of Black-Hole Nodes in Delay-Tolerant Internet of Vehicles

open access: yesSensors, 2021
Delay-tolerant networking (DTN) enables communication in disruptive scenarios where issues such as sparse and intermittent connectivity, long and variable delays, high latency, high error rates, or no end-to-end connectivity exist.
Catarina Nabais   +2 more
doaj   +1 more source

An Integral Cybersecurity Approach Using a Many-Objective Optimization Strategy

open access: yesIEEE Access, 2023
Data networks and computing devices have experienced exponential growth. Within a short span of time, they have opened new digital frontiers while also bringing forth new threats.
Omar Salinas   +3 more
doaj   +1 more source

A UAV-Assisted Stackelberg Game Model for Securing loMT Healthcare Networks

open access: yesDrones, 2023
On the one hand, the Internet of Medical Things (IoMT) in healthcare systems has emerged as a promising technology to monitor patients’ health and provide reliable medical services, especially in remote and underserved areas.
Jamshed Ali Shaikh   +7 more
doaj   +1 more source

Tracing astrophysical black hole seeds and primordial black holes with LISA-Taiji network

open access: yesMonthly Notices of the Royal Astronomical Society, 2022
ABSTRACT In this work, we discuss the improvement that the joint network of LISA and Taiji could provide on exploring two kinds of black hole formation mechanisms. For astrophysical origin, we consider light seed and heavy seed scenarios, and generate populations accordingly.
Yuchan Yang   +4 more
openaire   +2 more sources

Entanglement, tensor networks and black hole horizons [PDF]

open access: yesGeneral Relativity and Gravitation, 2014
We elaborate on a previous proposal by Hartman and Maldacena on a tensor network which accounts for the scaling of the entanglement entropy in a system at a finite temperature. In this construction, the ordinary entanglement renormalization flow given by the class of tensor networks known as the Multi Scale Entanglement Renormalization Ansatz (MERA ...
Molina-Vilaplana, J., Prior, J.
openaire   +3 more sources

Detection and Localization of Network Black Holes [PDF]

open access: yesIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, 2007
Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fault monitoring capabilities that are built into today's IP protocols and routers.
R. R. Kompella   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy