Results 51 to 60 of about 90,307 (120)

RPKI Defense Capability Simulation Method Based on Container Virtualization

open access: yesApplied Sciences
As the main inter-domain routing protocol in today’s internet, the Border Gateway Protocol (BGP) faces serious security risks during actual usage. Research on BGP malicious attack methods requires a realistic network environment, and evaluation methods ...
Bo Yu, Xingyuan Liu, Xiaofeng Wang
doaj   +1 more source

Towards an In-depth Understanding of Deep Packet Inspection Using a Suite of Industrial Control Systems Protocol Packets

open access: yesJournal of Cybersecurity Education, Research & Practice, 2016
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures.
Guillermo A. Francia III   +2 more
doaj  

Improving the Ownership Regulation in the Broadcasting Industry

open access: yesKDI Journal of Economic Policy, 2011
This paper uses the horizontal regulation system as the base analysis framework. The study clearly defines the regulatory goals of the followings: the horizontal cross-ownership regulations on program provider (PP) and platform provider, the vertical ...
Lee, Su il
doaj   +1 more source

The Raincore Distributed Session Service for Networking Elements [PDF]

open access: yes, 2001
Motivated by the explosive growth of the Internet, we study efficient and fault-tolerant distributed session layer protocols for networking elements. These protocols are designed to enable a network cluster to share the state information necessary for
Bruck, Jehoshua, Fan, Chenggong Charles
core  

A History Of The Improvement Of Internet Protocols Over Satellites Using ACTS [PDF]

open access: yes
This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels.
Hans Kruse, Mark Allman, Shawn Ostermann
core   +1 more source

Modeling and Testing Implementations of Protocols with Complex Messages [PDF]

open access: yes, 2018
This paper presents a new language called APSL for formally describing protocols to facilitate automated testing. Many real world communication protocols exchange messages whose structures are not trivial, e.g.
Prasetya, I. S. W. B., Tervoort, Tom
core   +1 more source

A novel pseudo-random generator based on discrete chaotic iterations

open access: yes, 2009
International audienceSecurity of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of ...
Bahi, Jacques   +2 more
core   +1 more source

Edge Computing for Smart-City Human Habitat: A Pandemic-Resilient, AI-Powered Framework

open access: yesJournal of Sensor and Actuator Networks
The COVID-19 pandemic has highlighted the need for a robust medical infrastructure and crisis management strategy as part of smart-city applications, with technology playing a crucial role. The Internet of Things (IoT) has emerged as a promising solution,
Atlanta Choudhury   +4 more
doaj   +1 more source

Deep Space Network information system architecture study [PDF]

open access: yes, 1992
The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s.
Atkinson, D. J.   +9 more
core   +1 more source

Home - About - Disclaimer - Privacy