Results 41 to 50 of about 14,435 (215)
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional ...
Ziyad R. Alashhab+5 more
doaj +1 more source
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley +1 more source
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary+3 more
wiley +1 more source
The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to Internet security, and botmasters have adopted the robust concept of decentralisation to develop and ...
Arkan Hammoodi Hasan Kabla+4 more
doaj +1 more source
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley +1 more source
Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks
Vehicle Ad hoc Networks (VANETs) are an emergent wireless communication technology that has the potential to reduce the risk of accidents caused by drivers and provide a wide range of entertainment facilities. Because of the nature of VANETs' open-access
Mahmood A. Al-Shareeda+4 more
doaj +1 more source
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei+2 more
wiley +1 more source
An API for IPv6 Multihoming [PDF]
Publicado
Isaias Martinez-Yelmo+2 more
openaire +2 more sources
Research on Wireless Sensor Adaptive Networking for Power Monitoring Based on Ultra Wide Band
A new network architecture is proposed to address the issue of limited sensor energy and computing power, which utilizes routing nodes to collect sensor data and network the routing nodes. However, the current mature wireless communication technology and networking protocols cannot meet the high reliability and flexibility transmission requirements of ...
Kaiyun Wen, Hongshan Zhao, Shice Zhao
wiley +1 more source
I-TNT: PHONE NUMBER EXPANSION AND TRANSLATION SYSTEM FOR MANAGING INTERCONNECTIVITY ADDRESSING IN SIP PEERING [PDF]
Voice over IP (VoIP) subscribers is growing vastly in the recent years due to the ever increase in smartphones, 3G, WiFi, etc. This growth leads the VoIP service providers to peer with each other through Session Initiation Protocol (SIP) peering for low ...
A. A. KHUDHER, S. RAMADASS
doaj