Results 21 to 30 of about 58,524 (307)
Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience.
Alejandro Molina Zarca+4 more
doaj +1 more source
Maritime Traffic Evaluation Using Spatial-Temporal Density Analysis Based on Big AIS Data
For developing national maritime traffic routes through the coastal waters of Korea, the customary maritime traffic flow must be accurately identified and quantitatively evaluated.
Yoon-Ji Kim+6 more
doaj +1 more source
Design and Application Prospects of Zero-Trust Architecture for Near-Space Networks [PDF]
The unique position of near space makes its network, centered around various near-space vehicles, a critical component of the integrated air-space-ground network.
Qiao Liu+4 more
doaj +1 more source
Research on network information security model and system construction
It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security.
Wang Haijun
doaj +1 more source
Policy increasing security companies on the internet [PDF]
Enterprise Security on the Internet is of crucial importance for the business, irrespective of the fact that the cost of developing the solutions necessary for proper protection are often quite large.
Trajković Slaviša+2 more
doaj +1 more source
KubeAegis: A Unified Security Policy Management Framework for Containerized Environments
Recently, containers have become the standard for cloud-native service delivery, ensuring scalability and reliability. However, they are also prime targets for various security attacks that exploit vulnerabilities.
Bom Kim, Seungsoo Lee
doaj +1 more source
Negotiation of Network Security Policy by Means of Agents [PDF]
Publicado
Pablo Martin+2 more
openaire +3 more sources
Correction: The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies
This article details a correction to the article: Zhang, L., Ekmekci, P.E., Murray, V., Basbug Erkan, B., Crawley, F.P., Li, X. and Li, Y. (2024) ‘The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies’, Data Science Journal, 23(1), p.
Lili Zhang+6 more
doaj +1 more source
Multi-Path Routing Algorithm Based on Deep Reinforcement Learning for SDN
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial of Service (DDoS) attacks due to centralized control and flow-table constraints in network devices.
Yi Zhang+6 more
doaj +1 more source
: The US security policy toward East Asia since Obama administration’s policy of “Pivot” had transformed its security partnership with the East Asia allies.
Ping-Kuei Chen
doaj +1 more source