Results 71 to 80 of about 53,372 (247)
The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to Internet security, and botmasters have adopted the robust concept of decentralisation to develop and ...
Arkan Hammoodi Hasan Kabla+4 more
doaj +1 more source
OpenFlow Deployment and Concept Analysis
Terms such as SDN and OpenFlow (OF) are often used in the research and development of data networks. This paper deals with the analysis of the current state of OpenFlow protocol deployment options as it is the only real representative protocol that ...
Tomas Hegr+3 more
doaj +1 more source
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional ...
Ziyad R. Alashhab+5 more
doaj +1 more source
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley +1 more source
High-speed, in-band performance measurement instrumentation for next generation IP networks [PDF]
Facilitating always-on instrumentation of Internet traffic for the purposes of performance measurement is crucial in order to enable accountability of resource usage and automated network control, management and optimisation.
Aweya+6 more
core +1 more source
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei+2 more
wiley +1 more source
Research on Wireless Sensor Adaptive Networking for Power Monitoring Based on Ultra Wide Band
A new network architecture is proposed to address the issue of limited sensor energy and computing power, which utilizes routing nodes to collect sensor data and network the routing nodes. However, the current mature wireless communication technology and networking protocols cannot meet the high reliability and flexibility transmission requirements of ...
Kaiyun Wen, Hongshan Zhao, Shice Zhao
wiley +1 more source
PERFORMANCE ANALYSIS BETWEEN EXPLICIT SCHEDULING AND IMPLICIT SCHEDULING OF PARALLEL ARRAY-BASED DOMAIN DECOMPOSITION USING OPENMP [PDF]
With the continuous revolution of multicore architecture, several parallel programming platforms have been introduced in order to pave the way for fast and efficient development of parallel algorithms.
MOHAMMED FAIZ ABOALMAALY+3 more
doaj
Minimizing IoT Energy Consumption Using BLE and Metaprotocol Architecture
The Internet of Things is a very fast‐growing industry thanks to the increasing availability of cheap microcontrollers, which are its main component. However, the commonly used cloud technologies are not best suited for resource‐constrained devices, so energy optimization is needed to extend their battery life.
L. Milić+3 more
wiley +1 more source
Overcoming obstacles to IPv6 on WLCG [PDF]
The transition of the Worldwide Large Hadron Collider Computing Grid (WLCG) storage services to dual-stack IPv6/IPv4 is almost complete; all Tier-1 and 94% of Tier-2 storage are IPv6 enabled.
Babik Marian+20 more
doaj +1 more source