Results 81 to 90 of about 4,562 (186)

Probabilistic models for evaluating network edge's resistance against scan and foothold attack

open access: yesIET Communications, Volume 18, Issue 20, Page 1983-1995, December 2024.
The threat of Scan and Foothold Attack to the Network Edge (SFANE) is increasing, which greatly affects the application and development of edge computing network architecture. According to the state‐of‐the‐art defense technologies, we illustrate three different defense strategies: no defense, address mutation, and fingerprint decoy. Subsequently, three
Shuo Wang   +6 more
wiley   +1 more source

Implementing energy saving algorithms for Ethernet link aggregates with ONOS

open access: yes, 2018
During the last few years, there has been plenty of research for reducing energy consumption in telecommunication infrastructure. However, many of the proposals remain unim-plemented due to the lack of flexibility in legacy networks.
Ferreiro, Pablo Fondo   +2 more
core   +1 more source

Primate cerebrospinal fluid CHI3L1 reflects brain TREM2 agonism

open access: yesAlzheimer's &Dementia, Volume 20, Issue 9, Page 5861-5888, September 2024.
Abstract INTRODUCTION Triggering receptor expressed on myeloid cells 2 (TREM2) agonists are being clinically evaluated as disease‐modifying therapeutics for Alzheimer's disease. Clinically translatable pharmacodynamic (PD) biomarkers are needed to confirm drug activity and select the appropriate therapeutic dose in clinical trials. METHODS We conducted
Stephen P. Schauer   +46 more
wiley   +1 more source

Генетический алгоритм защиты SDN от сетевых атак

open access: yesSistemnì Doslìdženâ ta Informacìjnì Tehnologìï, 2016
Рассмотрены проблемы обнаружения и блокирования сетевых атак при помощи SDN. Эта проблема сформулирована как задача нахождения "правильного" вектора и является задачей бинарного целочисленного программирования.
Stanislav Igorovych Zabielin
doaj   +1 more source

LAMP: Prompt Layer 7 Attack Mitigation with Programmable Data Planes

open access: yes, 2018
While there are various methods to detect application layer attacks or intrusion attempts on an individual end host, it is not efficient to provide all end hosts in the network with heavy-duty defense systems or software firewalls.
Grigoryan, Garegin, Liu, Yaoqing
core   +1 more source

Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract Connectivity and data exchange are key features of Industry 4.0. In this paradigm, (Industrial) Internet of Things ((I)IoT) devices are a vital component facilitating the collection and transmission of environmental data from the physical system to the central station for processing and analysis (digital twin [DT]).
Mohammed El‐Hajj   +2 more
wiley   +1 more source

Adaptive video transmission over software defined networks

open access: yesVisión Electrónica, 2019
This paper presents the results of a study on the evaluation of adaptive transmission of video streams using the DASH technique on Software Defined Networks.
Fran Wilson Sanabria Navarro   +2 more
doaj   +1 more source

BPNN‐based flow classification and admission control for software defined IIoT

open access: yesIET Communications, Volume 18, Issue 15, Page 882-896, September 2024.
In this paper a novel FAC approach is proposed in which the incoming flows are classified using the back propagation neural network, with eight features and five classes. The thresholds of the proposed scheme are dynamically decided by stochastic network calculus based on bandwidth and buffer size.
Cheng Wang, Hai Xue, Zhan Huan
wiley   +1 more source

Dynamic resource management in SDN-based virtualized networks [PDF]

open access: yes, 2014
Network virtualization allows for an abstraction between user and physical resources by letting a given physical infrastructure to be shared by multiple service providers.
Bouten, Niels   +5 more
core  

Evaluating RPKI ROV identification methodologies in automatically generated mininet topologies

open access: yesProceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, 2020
The deployment of the Resource Public Key Infrastructure (RPKI) is currently gaining traction within the operator community and so are measurement methodologies trying to measure the current deployment status. These methodologies, which are attempting to infer Autonomous Systems (ASs) performing Route Origin Validation (ROV), are applied onto real ...
Rodday, Nils Miro   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy