Results 51 to 60 of about 14,303 (202)

On the security of software-defined next-generation cellular networks [PDF]

open access: yes, 2016
In the recent years, mobile cellular networks are ndergoing fundamental changes and many established concepts are being revisited. Future 5G network architectures will be designed to employ a wide range of new and emerging technologies such as Software ...
Alzahrani, Bander   +3 more
core  

Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim   +3 more
wiley   +1 more source

Security Model for TCP/IP Protocol Suite

open access: yesJournal of Advances in Information Technology, 2011
the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today’s Internet.  Internet usage continues to increase exponentially.
Anand Kumar, S. Karthikeyan
doaj   +1 more source

Teleoperation of passivity-based model reference robust control over the internet [PDF]

open access: yes, 2011
This dissertation offers a survey of a known theoretical approach and novel experimental results in establishing a live communication medium through the internet to host a virtual communication environment for use in Passivity-Based Model Reference ...
Naghshineh, Sam
core  

A model for the analysis of security policies in service function chains

open access: yes, 2017
Two emerging architectural paradigms, i.e., Software Defined Networking (SDN) and Network Function Virtualization (NFV), enable the deployment and management of Service Function Chains (SFCs).
Durante, L.   +3 more
core   +1 more source

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]

open access: yes, 2012
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T.   +4 more
core   +1 more source

A Petri net model for Time‐Delay Attack detection in Precision Time Protocol‐based networks

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 9, Issue 4, Page 407-423, December 2024.
The authors propose a Petri net model as a formal validation tool to evaluate the robustness of the Precision Time Protocol (PTP) algorithm in a network and to assess the accuracy and capabilities of Time Delay Attack and detection algorithms. The proposed model is applicable to implement the synchronisation process in different network topologies ...
Mohsen Moradi, Amir Hossein Jahangir
wiley   +1 more source

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

open access: yesJournal of Critical Infrastructure Policy, Volume 5, Issue 2, Page 88-110, Fall/Winter 2024.
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer   +5 more
wiley   +1 more source

Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services [PDF]

open access: yes, 2013
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication
Duquennoy, Simon   +6 more
core   +1 more source

Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum

open access: yesSoftware: Practice and Experience, Volume 54, Issue 8, Page 1543-1564, August 2024.
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy