RPKI Defense Capability Simulation Method Based on Container Virtualization
As the main inter-domain routing protocol in today’s internet, the Border Gateway Protocol (BGP) faces serious security risks during actual usage. Research on BGP malicious attack methods requires a realistic network environment, and evaluation methods ...
Bo Yu, Xingyuan Liu, Xiaofeng Wang
doaj +1 more source
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures.
Guillermo A. Francia III+2 more
doaj
Improving the Ownership Regulation in the Broadcasting Industry
This paper uses the horizontal regulation system as the base analysis framework. The study clearly defines the regulatory goals of the followings: the horizontal cross-ownership regulations on program provider (PP) and platform provider, the vertical ...
Lee, Su il
doaj +1 more source
The way to the future has already started: ICAO Aeronautical Telecommunication Network (ATN) using Internet Protocol Suite (IPS) Standards and Protocol evolution update [PDF]
Rafael D. Apaza, Liviu Popescu
openalex +2 more sources
The Raincore Distributed Session Service for Networking Elements [PDF]
Motivated by the explosive growth of the Internet, we study efficient and fault-tolerant distributed session layer protocols for networking elements. These protocols are designed to enable a network cluster to share the state information necessary for
Bruck, Jehoshua, Fan, Chenggong Charles
core
A History Of The Improvement Of Internet Protocols Over Satellites Using ACTS [PDF]
This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels.
Hans Kruse, Mark Allman, Shawn Ostermann
core +1 more source
Modeling and Testing Implementations of Protocols with Complex Messages [PDF]
This paper presents a new language called APSL for formally describing protocols to facilitate automated testing. Many real world communication protocols exchange messages whose structures are not trivial, e.g.
Prasetya, I. S. W. B., Tervoort, Tom
core +1 more source
A novel pseudo-random generator based on discrete chaotic iterations
International audienceSecurity of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of ...
Bahi, Jacques+2 more
core +1 more source
Edge Computing for Smart-City Human Habitat: A Pandemic-Resilient, AI-Powered Framework
The COVID-19 pandemic has highlighted the need for a robust medical infrastructure and crisis management strategy as part of smart-city applications, with technology playing a crucial role. The Internet of Things (IoT) has emerged as a promising solution,
Atlanta Choudhury+4 more
doaj +1 more source
Deep Space Network information system architecture study [PDF]
The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s.
Atkinson, D. J.+9 more
core +1 more source