Results 291 to 300 of about 6,361,006 (369)

Adaptive Jamming Mitigation for Clustered Energy-Efficient LoRa-BLE Hybrid Wireless Sensor Networks. [PDF]

open access: yesSensors (Basel)
Del-Valle-Soto C   +5 more
europepmc   +1 more source

Cross-layer latency analysis for 5G NR in V2X communications. [PDF]

open access: yesPLoS One
Horta J, Siller M, Villarreal-Reyes S.
europepmc   +1 more source

GeNIS: A modular dataset for network intrusion detection and classification. [PDF]

open access: yesData Brief
Silva M   +5 more
europepmc   +1 more source

Network Packet Forensics

2010
Eddie Schwartz is Chief Security Officer for NetWitness, the world leader in advanced threat intelligence and network forensics. He has 25 years of experience as an information security and privacy expert, specializing in the financial services and federal government sectors.
Eddie Schwartz
openaire   +3 more sources

Networks with cognitive packets [PDF]

open access: possibleProceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728), 2002
Based on our earlier work ("Towards networks with intelligent packets", Proc. 14th Int. Symp. on Computer and Information Sciences, p. 1-11, Oct. 1999), we discuss packet networks in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols.
Zhiguang Xu, Erol Gelenbe, Ricardo Lent
openaire   +1 more source

Routing or Computing? The Paradigm Shift Towards Intelligent Computer Network Packet Transmission Based on Deep Learning

IEEE transactions on computers, 2017
Recent years, Software Defined Routers (SDRs) (programmable routers) have emerged as a viable solution to provide a cost-effective packet processing platform with easy extensibility and programmability.
Bomin Mao   +6 more
semanticscholar   +1 more source

SQR: In-network Packet Loss Recovery from Link Failures for Highly Reliable Datacenter Networks

IEEE International Conference on Network Protocols, 2019
In datacenter networks, flows need to complete as quickly as possible because the flow completion time (FCT) directly impacts user experience, and thus revenue.
Ting Qu   +5 more
semanticscholar   +1 more source

Out-VM monitoring for Malicious Network Packet Detection in cloud

2017 ISEA Asia Security and Privacy (ISEASP), 2017
Cloud security is one of the biggest challenge in today's technological world. Researchers have proposed some solutions for cloud security. Virtual Machine (VM)-level solutions are configured and controlled at VM.
Preeti Mishra   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy