Results 51 to 60 of about 14,303 (202)
On the security of software-defined next-generation cellular networks [PDF]
In the recent years, mobile cellular networks are ndergoing fundamental changes and many established concepts are being revisited. Future 5G network architectures will be designed to employ a wide range of new and emerging technologies such as Software ...
Alzahrani, Bander +3 more
core
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim +3 more
wiley +1 more source
Security Model for TCP/IP Protocol Suite
the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet. Internet usage continues to increase exponentially.
Anand Kumar, S. Karthikeyan
doaj +1 more source
Teleoperation of passivity-based model reference robust control over the internet [PDF]
This dissertation offers a survey of a known theoretical approach and novel experimental results in establishing a live communication medium through the internet to host a virtual communication environment for use in Passivity-Based Model Reference ...
Naghshineh, Sam
core
A model for the analysis of security policies in service function chains
Two emerging architectural paradigms, i.e., Software Defined Networking (SDN) and Network Function Virtualization (NFV), enable the deployment and management of Service Function Chains (SFCs).
Durante, L. +3 more
core +1 more source
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T. +4 more
core +1 more source
A Petri net model for Time‐Delay Attack detection in Precision Time Protocol‐based networks
The authors propose a Petri net model as a formal validation tool to evaluate the robustness of the Precision Time Protocol (PTP) algorithm in a network and to assess the accuracy and capabilities of Time Delay Attack and detection algorithms. The proposed model is applicable to implement the synchronisation process in different network topologies ...
Mohsen Moradi, Amir Hossein Jahangir
wiley +1 more source
Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer +5 more
wiley +1 more source
Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services [PDF]
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication
Duquennoy, Simon +6 more
core +1 more source
Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski +3 more
wiley +1 more source

