Results 71 to 80 of about 3,896 (237)

Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo

open access: yesThe Scientific World Journal, Volume 2014, Issue 1, 2014., 2014
IPv4‐IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks ...
D. Shalini Punithavathani   +2 more
wiley   +1 more source

DCIDS—Distributed Container IDS

open access: yesApplied Sciences, 2023
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose security ...
Savio Levy Rocha   +4 more
doaj   +1 more source

Sesquilinear forms as eigenvectors in quasi *‐algebras, with an application to ladder elements

open access: yesMathematische Nachrichten, Volume 298, Issue 3, Page 1062-1075, March 2025.
Abstract We consider a particular class of sesquilinear forms on a Banach quasi *‐algebra (A[∥.∥],A0[∥.∥0])$({\cal A}[\Vert .\Vert],{\cal A}_0[\Vert .\Vert _0])$ that we call eigenstates of an element a∈A$a\in {\cal A}$, and we deduce some of their properties.
Fabio Bagarello   +2 more
wiley   +1 more source

Reinforcing Cloud Attack Tolerance on a Large Scale: Advanced Blockchain Technologies With Hierarchical Risk and Smart Contracts

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer   +2 more
wiley   +1 more source

Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism

open access: yesIET Communications, Volume 18, Issue 17, Page 1107-1125, October 2024.
The article introduces an automated labeling method for enhancing Intrusion Detection Systems (IDS) in the context of Industry 4.0. Leveraging transfer learning and attention mechanisms, the proposed approach demonstrates nearly a 10% improvement in detection performance compared to reference models, addressing challenges related to limited labeled ...
Dinh‐Minh Vu   +4 more
wiley   +1 more source

Analysis of Routing Protocols for a Wired Network [PDF]

open access: yes, 2014
For communication to happen, data need to be transferred from source to the destination. So router is a device which helps in forwarding packets from one network to another or from one node to another in a network.
Sahoo, S K
core  

Implementation of IPsec-VPN Tunneling using GNS3 [PDF]

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2017
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets.  IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator.
openaire   +1 more source

Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM)

open access: yesIET Networks, Volume 13, Issue 5-6, Page 486-512, September-November 2024.
The authors propose the Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM), a novel multicast routing protocol that keeps the design principles of PIM‐SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees.
Ana Catarina Grilo   +2 more
wiley   +1 more source

Виртуализация сетей передачи данных в Dynamips [PDF]

open access: yes, 2009
The article describes the main aspects of virtualization features of the methods based on software Dynamips/Dynagen/GNS3, obtained during the practical research as modeling approaches and options for building a complex converged enterprise networks based
Демчинский, В. В.   +2 more
core  

Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies

open access: yesIET Networks, Volume 13, Issue 3, Page 241-248, May 2024.
Open Shortest Path First (OSPF) currently supports multiarea networking with two severe limitations: the multiarea topology is restricted to a two‐level hierarchy, and globally optimal routing may not be achieved. An OSPF extension that overcomes these limitations is proposed by introducing a routing overlay for the dissemination of multiarea routing ...
Xavier Gomes, João Fonseca, Rui Valadas
wiley   +1 more source

Home - About - Disclaimer - Privacy