Results 41 to 50 of about 4,562 (186)

Security and Privacy Issues of Big Data [PDF]

open access: yes, 2015
This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy.
Moura, Jose, Serrao, Carlos
core   +2 more sources

SVM driven approach for detecting DoS attacks in SDN environment

open access: yesInternational Journal for Simulation and Multidisciplinary Design Optimization
Software-Defined Networking (SDN) reveals a significant progression in networking technology, offering improved management and operational oversight of network infrastructures.
Nisa Najmun   +3 more
doaj   +1 more source

BBR Advanced (BBR-A) — Reduced retransmissions with improved fairness

open access: yesICT Express, 2020
In 2016, Google proposed Bottleneck Bandwidth and Round-trip-time (BBR), a new TCP congestion control algorithm to avoid bottleneck queue formation and utilize underlying bandwidth in full.
Imtiaz Mahmud, You-Ze Cho
doaj   +1 more source

Traffic Engineering with Segment Routing: SDN-based Architectural Design and Open Source Implementation

open access: yes, 2015
Traffic Engineering (TE) in IP carrier networks is one of the functions that can benefit from the Software Defined Networking paradigm. By logically centralizing the control of the network, it is possible to "program" per-flow routing based on TE goals ...
Davoli, Luca   +4 more
core   +1 more source

Enabling scalable emulation of differentiated services in mininet

open access: yesProceedings of the 13th ACM Multimedia Systems Conference, 2022
Evolving Internet applications, such as immersive multimedia and Industry 4, exhibit stringent delay, loss, and rate requirements. Realizing these requirements would be difficult without advanced dynamic traffic management solutions that leverage state-of-the-art technologies, such as Software-Defined Networking (SDN).
Raca, Darijo   +2 more
openaire   +2 more sources

ECLYPSE: A Python Framework for Simulation and Emulation of the Cloud‐Edge Continuum

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 1, January 2026.
ABSTRACT The Cloud‐Edge continuum enhances application performance by bringing computation closer to data sources. However, it presents considerable challenges in managing resources and determining application service placement, as these tasks require analyzing diverse, dynamic environments characterized by fluctuating network conditions.
Jacopo Massa   +5 more
wiley   +1 more source

D-LIA: Dynamic congestion control algorithm for MPTCP

open access: yesICT Express, 2020
The congestion control algorithm (CCA) of Multipath TCP (MPTCP) mainly portrays​ two fundamental challenges to properly utilize the available bandwidth.
Tabassum Lubna   +2 more
doaj   +1 more source

Penerapan Dynamic Flow Removal untuk Mencegah Flow Table Overflow pada Software-Defined Networking

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2022
Software-Defined Networking (SDN) memungkinkan penerusan paket data secara terprogram dalam sebuah jaringan dengan mendefinisikan rincian flow dalam flow table setiap switch jaringan.
Achmad Basuki   +2 more
doaj   +1 more source

DDoS Attack Detection Based on DBN in SDN Environment [PDF]

open access: yesJisuanji gongcheng, 2020
The main security threats to Software Defined Network(SDN),a new type of network architecture,are from DDoS attacks.Hence,theestablishment of an efficient DDoS attack detection system is importantt to network security management.In the SDN environment ...
ZHU Jing, WU Zhongdong, DING Longbin, WANG Yang
doaj   +1 more source

AKG‐VO: Adaptive Keyframe Generation Method for Improving Visual Odometry in Autonomous Vehicles

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 12, December 2025.
An adaptive keyframe generation method for pose estimation is proposed, incorporating optical flow‐based interframe gap estimation and video frame interpolation techniques. By limiting interframe gaps, meaningful keyframes are generated to enhance tracking reliability.
Donghyun Lee   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy