Results 1 to 10 of about 6,332,366 (301)
Requirements for Crafting Virtual Network Packet Captures
Currently, network environments are complex infrastructures with different levels of security, isolation and permissions. The management of these networks is a complex task, faced with different issues such as adversarial attacks, user demands ...
Daniel Spiekermann, Jörg Keller
doaj +1 more source
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj +1 more source
A Theoretical Exploration of the Impact of Packet Loss on Network Intrusion Detection [PDF]
In this paper we review the problem of packet loss as it pertains to Network Intrusion Detection, seeking to answer two fundamental research questions which are stepping stones towards building a model that can be used to predict the rate of alert loss ...
Sidney C. Smith +3 more
doaj +1 more source
Real-Time In-Network Microburst Mitigation on Programmable Switch
Microbursts in the datacenter network (DCN) last for an extremely short time in switches and are difficult to discover from a coarse-grained perspective.
Yu-Jie Lin +2 more
doaj +1 more source
EXPERIMENTAL PERFORMANCE EVALUATION AND FEASIBILITY STUDY OF 6LoWPAN BASED INTERNET OF THINGS [PDF]
Nowadays, demand for low power, small, mobile and flexible computing machines that interconnects are growing rapidly. This study highlights internet of things (IoT) model regarding sensor node discovery and IPV6 framework using 6LoWPAN. Contiki network
James AGAJO +5 more
doaj +1 more source
5G Campus Networks: A First Measurement Study
A 5G campus network is a 5G network for the users affiliated with the campus organization, e.g., an industrial campus, covering a prescribed geographical area. A 5G campus network can operate as a so-called 5G non-standalone (NSA) network (which requires
Justus Rischke +4 more
doaj +1 more source
EVALUATION OF VOICE TRANSMISSION QUALITY IN THE LTE NETWORKS
Background. LTE mobile networks combine packet network technology and radio technology. Parameters of packet and radio subsystems significantly affects the quality of all traffic types transmission, especially telephone traffic, as the most demanding to ...
Іван Ветошко +1 more
doaj +1 more source
In many Internet of Things (IoT) systems and monitoring wireless sensor networks (WSNs), sensor nodes are expected to function for prolonged periods of time with no scope of recharging the sensor node batteries.
Lilian C. Mutalemwa, Seokjoo Shin
doaj +1 more source
MAC Protocol Based on RS-Polar Coding for Airborne Tactical Network [PDF]
For the features of high speed moving,sparse distribution,diversity of data service,etc.,and Quality of Service(QoS) demand of high reliability and low latency when transmitting time-sensitive information in airborne tactical networks,a random access ...
ZHAO Wei,ZHENG Bo,ZHANG Hengyang,MAO Yuquan
doaj +1 more source
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of ...
Eva Papadogiannaki, Sotiris Ioannidis
doaj +1 more source

