Results 21 to 30 of about 58,524 (307)

Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems

open access: yesSensors, 2020
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience.
Alejandro Molina Zarca   +4 more
doaj   +1 more source

Maritime Traffic Evaluation Using Spatial-Temporal Density Analysis Based on Big AIS Data

open access: yesApplied Sciences, 2022
For developing national maritime traffic routes through the coastal waters of Korea, the customary maritime traffic flow must be accurately identified and quantitatively evaluated.
Yoon-Ji Kim   +6 more
doaj   +1 more source

Design and Application Prospects of Zero-Trust Architecture for Near-Space Networks [PDF]

open access: yes中国工程科学
The unique position of near space makes its network, centered around various near-space vehicles, a critical component of the integrated air-space-ground network.
Qiao Liu   +4 more
doaj   +1 more source

Research on network information security model and system construction

open access: yesSHS Web of Conferences, 2016
It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security.
Wang Haijun
doaj   +1 more source

Policy increasing security companies on the internet [PDF]

open access: yesEkonomski Pogledi, 2015
Enterprise Security on the Internet is of crucial importance for the business, irrespective of the fact that the cost of developing the solutions necessary for proper protection are often quite large.
Trajković Slaviša   +2 more
doaj   +1 more source

KubeAegis: A Unified Security Policy Management Framework for Containerized Environments

open access: yesIEEE Access
Recently, containers have become the standard for cloud-native service delivery, ensuring scalability and reliability. However, they are also prime targets for various security attacks that exploit vulnerabilities.
Bom Kim, Seungsoo Lee
doaj   +1 more source

Negotiation of Network Security Policy by Means of Agents [PDF]

open access: yes, 2010
Publicado
Pablo Martin   +2 more
openaire   +3 more sources

Correction: The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies

open access: yesData Science Journal
This article details a correction to the article: Zhang, L., Ekmekci, P.E., Murray, V., Basbug Erkan, B., Crawley, F.P., Li, X. and Li, Y. (2024) ‘The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies’, Data Science Journal, 23(1), p.
Lili Zhang   +6 more
doaj   +1 more source

Multi-Path Routing Algorithm Based on Deep Reinforcement Learning for SDN

open access: yesApplied Sciences, 2023
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial of Service (DDoS) attacks due to centralized control and flow-table constraints in network devices.
Yi Zhang   +6 more
doaj   +1 more source

SITTING OUTSIDE THE NETWORK: REASSURING THE STABILITY OF THE TAIWAN STRAIT UNDER THE TRUMP ADMINISTRATION

open access: yesRevista UNISCI, 2018
: The US security policy toward East Asia since Obama administration’s policy of “Pivot” had transformed its security partnership with the East Asia allies.
Ping-Kuei Chen
doaj   +1 more source

Home - About - Disclaimer - Privacy