Results 41 to 50 of about 215 (173)
Software‐Defined Virtual Testbed for IoT Systems
The Internet of Things concept has found applications in a wide range of solutions, including smart homes, smart cities, enterprise systems, and others. Due to the limited resources available on physical devices and the intermittent availability of wireless networks, IoT may hugely benefit from Mobile Cloud Computing as it may provide the necessary ...
Joanna Sendorek +3 more
wiley +1 more source
A Comprehensive Survey on LLM‐Based Network Management and Operations
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong +2 more
wiley +1 more source
An Approach for Internal Network Security Metric Based on Attack Probability
A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has
Chun Shan +5 more
wiley +1 more source
Gravity Modeling of Lunar Lava Tubes: Insights From a Terrestrial Analog
Abstract The exploration of lunar lava tubes can address challenges of human habitation on the Moon by identifying natural shelters against radiation, temperature extremes, and micrometeoroid impacts. This study shows the feasibility of detecting lunar lava tubes with gravimetry using Ape Cave in Washington State, USA, as a terrestrial analog. Ape Cave'
Sarai Montañez Muñoz +4 more
wiley +1 more source
LISP Optimisation of Mobile Data Streaming in Connected Societies
Mobility mechanisms are key elements of “always connected” smart environments. Since the first mobile IPv4 protocols, the IP mobility solutions have evolved from host mobility to network mobility and migration to IPv6, but there are still use‐cases to be covered, especially for redundant multihomed scenarios.
T. Balan +3 more
wiley +1 more source
DCIDS—Distributed Container IDS
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose security ...
Savio Levy Rocha +4 more
doaj +1 more source
Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo
IPv4‐IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks ...
D. Shalini Punithavathani +2 more
wiley +1 more source
Sesquilinear forms as eigenvectors in quasi *‐algebras, with an application to ladder elements
Abstract We consider a particular class of sesquilinear forms on a Banach quasi *‐algebra (A[∥.∥],A0[∥.∥0])$({\cal A}[\Vert .\Vert],{\cal A}_0[\Vert .\Vert _0])$ that we call eigenstates of an element a∈A$a\in {\cal A}$, and we deduce some of their properties.
Fabio Bagarello +2 more
wiley +1 more source
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer +2 more
wiley +1 more source
The article introduces an automated labeling method for enhancing Intrusion Detection Systems (IDS) in the context of Industry 4.0. Leveraging transfer learning and attention mechanisms, the proposed approach demonstrates nearly a 10% improvement in detection performance compared to reference models, addressing challenges related to limited labeled ...
Dinh‐Minh Vu +4 more
wiley +1 more source

