Results 71 to 80 of about 43,044 (189)
Blockchain‐Enhanced Distributed Cache Management for Top‐Level Domain Resolution Optimization
A distributed domain master resolution architecture based on blockchain. ABSTRACT In the current Internet era, whether the domain name system (DNS) can achieve efficient resolution is of great significance for optimizing user experience and promoting global development.
Lianjie Song, Xueshan Lin
wiley +1 more source
A Survey on Handover Management in Mobility Architectures
This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on ...
Ferretti, Stefano +2 more
core +1 more source
CID‐RPL: Clone ID Attack Detection Using Deep Neural Network for RPL‐Based IoT Networks
This paper addresses the security vulnerability of Clone ID attacks in RPL‐based IoT networks, which threaten network integrity by cloning legitimate node identities. A novel two‐layer deep neural network approach is proposed to detect these attacks based on network traffic patterns, significantly improving detection accuracy, precision, and system ...
Fatima Al‐Quayed +5 more
wiley +1 more source
Exploring the Potential of AI in Network Slicing for 5G Networks: An Optimisation Framework
Our approach is to incorporate precise programming of segment routing over IPv6 (SRv6) identifiers, allowing dynamic assignment of SIDs based on predicted slice types, accurately distinguishing up to 40,000 eMBB slices and separating uRLLC and mMTC slices with high proficiency.
Zeina Boufakhreddine +4 more
wiley +1 more source
The use of IPv4 which has more than 30 years led to the capacity of available addresses is running out availability. Currently emerging new generation IP (IPnext generation) is IPv6. Many methods for the implementation of IPv6, one with tunneling.
Siswo Wardoyo +2 more
doaj +1 more source
Description and Experience of the Clinical Testbeds [PDF]
This deliverable describes the up-to-date technical environment at three clinical testbed demonstrator sites of the 6WINIT Project, including the adapted clinical applications, project components and network transition technologies in use at these ...
Kalra, D., Lawrentowski, A.
core
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley +1 more source
Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6
ABSTRAK OSPF (Open Shortest Path First) adalah suatu routing protokol bersifat terbuka dan didukung oleh berbagai perangkat network. IPv4 telah mencapai batas maksimum dalam jumlah alamat sehingga IPv6 merupakan solusi dalam hal tersebut.
PAULINE RAHMIATI +2 more
doaj +1 more source
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei +2 more
wiley +1 more source
Internet Protocol atau IP merupakan standar penomoran internet di dunia yang jumlahnya terbatas. Di dunia, alokasi IP diatur oleh Internet Assignd Number Authority (IANA) dan didelegasikan ke melalui otoritas masing-masing benua.
Riza Azmi
doaj +1 more source

