Results 71 to 80 of about 3,896 (237)
Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo
IPv4‐IPv6 transition rolls out numerous challenges to the world of Internet as the Internet is drifting from IPv4 to IPv6. IETF recommends few transition techniques which includes dual stack and translation and tunneling. By means of tunneling the IPv6 packets over IPv4 UDP, Teredo maintains IPv4/IPv6 dual stack node in isolated IPv4 networks ...
D. Shalini Punithavathani +2 more
wiley +1 more source
DCIDS—Distributed Container IDS
Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose security ...
Savio Levy Rocha +4 more
doaj +1 more source
Sesquilinear forms as eigenvectors in quasi *‐algebras, with an application to ladder elements
Abstract We consider a particular class of sesquilinear forms on a Banach quasi *‐algebra (A[∥.∥],A0[∥.∥0])$({\cal A}[\Vert .\Vert],{\cal A}_0[\Vert .\Vert _0])$ that we call eigenstates of an element a∈A$a\in {\cal A}$, and we deduce some of their properties.
Fabio Bagarello +2 more
wiley +1 more source
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer +2 more
wiley +1 more source
The article introduces an automated labeling method for enhancing Intrusion Detection Systems (IDS) in the context of Industry 4.0. Leveraging transfer learning and attention mechanisms, the proposed approach demonstrates nearly a 10% improvement in detection performance compared to reference models, addressing challenges related to limited labeled ...
Dinh‐Minh Vu +4 more
wiley +1 more source
Analysis of Routing Protocols for a Wired Network [PDF]
For communication to happen, data need to be transferred from source to the destination. So router is a device which helps in forwarding packets from one network to another or from one node to another in a network.
Sahoo, S K
core
Implementation of IPsec-VPN Tunneling using GNS3 [PDF]
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator.
openaire +1 more source
Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM)
The authors propose the Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM), a novel multicast routing protocol that keeps the design principles of PIM‐SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees.
Ana Catarina Grilo +2 more
wiley +1 more source
Виртуализация сетей передачи данных в Dynamips [PDF]
The article describes the main aspects of virtualization features of the methods based on software Dynamips/Dynagen/GNS3, obtained during the practical research as modeling approaches and options for building a complex converged enterprise networks based
Демчинский, В. В. +2 more
core
Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies
Open Shortest Path First (OSPF) currently supports multiarea networking with two severe limitations: the multiarea topology is restricted to a two‐level hierarchy, and globally optimal routing may not be achieved. An OSPF extension that overcomes these limitations is proposed by introducing a routing overlay for the dissemination of multiarea routing ...
Xavier Gomes, João Fonseca, Rui Valadas
wiley +1 more source

