Results 41 to 50 of about 215 (173)

Software‐Defined Virtual Testbed for IoT Systems

open access: yesWireless Communications and Mobile Computing, Volume 2018, Issue 1, 2018., 2018
The Internet of Things concept has found applications in a wide range of solutions, including smart homes, smart cities, enterprise systems, and others. Due to the limited resources available on physical devices and the intermittent availability of wireless networks, IoT may hugely benefit from Mobile Cloud Computing as it may provide the necessary ...
Joanna Sendorek   +3 more
wiley   +1 more source

A Comprehensive Survey on LLM‐Based Network Management and Operations

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong   +2 more
wiley   +1 more source

An Approach for Internal Network Security Metric Based on Attack Probability

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has
Chun Shan   +5 more
wiley   +1 more source

Gravity Modeling of Lunar Lava Tubes: Insights From a Terrestrial Analog

open access: yesJournal of Geophysical Research: Planets, Volume 130, Issue 11, November 2025.
Abstract The exploration of lunar lava tubes can address challenges of human habitation on the Moon by identifying natural shelters against radiation, temperature extremes, and micrometeoroid impacts. This study shows the feasibility of detecting lunar lava tubes with gravimetry using Ape Cave in Washington State, USA, as a terrestrial analog. Ape Cave'
Sarai Montañez Muñoz   +4 more
wiley   +1 more source

LISP Optimisation of Mobile Data Streaming in Connected Societies

open access: yesMobile Information Systems, Volume 2016, Issue 1, 2016., 2016
Mobility mechanisms are key elements of “always connected” smart environments. Since the first mobile IPv4 protocols, the IP mobility solutions have evolved from host mobility to network mobility and migration to IPv6, but there are still use‐cases to be covered, especially for redundant multihomed scenarios.
T. Balan   +3 more
wiley   +1 more source

DCIDS—Distributed Container IDS

open access: yesApplied Sciences, 2023
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose security ...
Savio Levy Rocha   +4 more
doaj   +1 more source

Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo

open access: yesThe Scientific World Journal, Volume 2014, Issue 1, 2014., 2014
IPv4‐IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks ...
D. Shalini Punithavathani   +2 more
wiley   +1 more source

Sesquilinear forms as eigenvectors in quasi *‐algebras, with an application to ladder elements

open access: yesMathematische Nachrichten, Volume 298, Issue 3, Page 1062-1075, March 2025.
Abstract We consider a particular class of sesquilinear forms on a Banach quasi *‐algebra (A[∥.∥],A0[∥.∥0])$({\cal A}[\Vert .\Vert],{\cal A}_0[\Vert .\Vert _0])$ that we call eigenstates of an element a∈A$a\in {\cal A}$, and we deduce some of their properties.
Fabio Bagarello   +2 more
wiley   +1 more source

Reinforcing Cloud Attack Tolerance on a Large Scale: Advanced Blockchain Technologies With Hierarchical Risk and Smart Contracts

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer   +2 more
wiley   +1 more source

Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism

open access: yesIET Communications, Volume 18, Issue 17, Page 1107-1125, October 2024.
The article introduces an automated labeling method for enhancing Intrusion Detection Systems (IDS) in the context of Industry 4.0. Leveraging transfer learning and attention mechanisms, the proposed approach demonstrates nearly a 10% improvement in detection performance compared to reference models, addressing challenges related to limited labeled ...
Dinh‐Minh Vu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy