Results 81 to 90 of about 4,562 (186)
Probabilistic models for evaluating network edge's resistance against scan and foothold attack
The threat of Scan and Foothold Attack to the Network Edge (SFANE) is increasing, which greatly affects the application and development of edge computing network architecture. According to the state‐of‐the‐art defense technologies, we illustrate three different defense strategies: no defense, address mutation, and fingerprint decoy. Subsequently, three
Shuo Wang +6 more
wiley +1 more source
Implementing energy saving algorithms for Ethernet link aggregates with ONOS
During the last few years, there has been plenty of research for reducing energy consumption in telecommunication infrastructure. However, many of the proposals remain unim-plemented due to the lack of flexibility in legacy networks.
Ferreiro, Pablo Fondo +2 more
core +1 more source
Primate cerebrospinal fluid CHI3L1 reflects brain TREM2 agonism
Abstract INTRODUCTION Triggering receptor expressed on myeloid cells 2 (TREM2) agonists are being clinically evaluated as disease‐modifying therapeutics for Alzheimer's disease. Clinically translatable pharmacodynamic (PD) biomarkers are needed to confirm drug activity and select the appropriate therapeutic dose in clinical trials. METHODS We conducted
Stephen P. Schauer +46 more
wiley +1 more source
Генетический алгоритм защиты SDN от сетевых атак
Рассмотрены проблемы обнаружения и блокирования сетевых атак при помощи SDN. Эта проблема сформулирована как задача нахождения "правильного" вектора и является задачей бинарного целочисленного программирования.
Stanislav Igorovych Zabielin
doaj +1 more source
LAMP: Prompt Layer 7 Attack Mitigation with Programmable Data Planes
While there are various methods to detect application layer attacks or intrusion attempts on an individual end host, it is not efficient to provide all end hosts in the network with heavy-duty defense systems or software firewalls.
Grigoryan, Garegin, Liu, Yaoqing
core +1 more source
Abstract Connectivity and data exchange are key features of Industry 4.0. In this paradigm, (Industrial) Internet of Things ((I)IoT) devices are a vital component facilitating the collection and transmission of environmental data from the physical system to the central station for processing and analysis (digital twin [DT]).
Mohammed El‐Hajj +2 more
wiley +1 more source
Adaptive video transmission over software defined networks
This paper presents the results of a study on the evaluation of adaptive transmission of video streams using the DASH technique on Software Defined Networks.
Fran Wilson Sanabria Navarro +2 more
doaj +1 more source
BPNN‐based flow classification and admission control for software defined IIoT
In this paper a novel FAC approach is proposed in which the incoming flows are classified using the back propagation neural network, with eight features and five classes. The thresholds of the proposed scheme are dynamically decided by stochastic network calculus based on bandwidth and buffer size.
Cheng Wang, Hai Xue, Zhan Huan
wiley +1 more source
Dynamic resource management in SDN-based virtualized networks [PDF]
Network virtualization allows for an abstraction between user and physical resources by letting a given physical infrastructure to be shared by multiple service providers.
Bouten, Niels +5 more
core
Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies
The deployment of the Resource Public Key Infrastructure (RPKI) is currently gaining traction within the operator community and so are measurement methodologies trying to measure the current deployment status. These methodologies, which are attempting to infer Autonomous Systems (ASs) performing Route Origin Validation (ROV), are applied onto real ...
Rodday, Nils Miro +5 more
openaire +2 more sources

