Results 21 to 30 of about 834,303 (333)
Security-aware Service Function Chain Deployment Method Based on Deep ReinforcementLearning [PDF]
As a key technology to improve the utilization of network resources,service function chain combined with deep reinforcement learning makes it possible to achieve flexible and secure deployment.However,how to effectively deploy service function chains ...
ZHU Ziyi, ZHANG Jianhui, ZENG Junjieand ZHANG Hongyuan
doaj +1 more source
This article reveals an adequate comprehension of basic defense, security challenges, and attack vectors in deploying multi-network slicing. Network slicing is a revolutionary concept of providing mobile network on-demand and expanding mobile networking ...
Stan Wong, Bin Han, Hans D. Schotten
doaj +1 more source
Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking
In order to build an efficient security architecture, previous studies have attempted to understand complex system architectures and message flows to detect various attack packets.
Woosik Lee, Namgi Kim
doaj +1 more source
An Effective Algorithm for Collision Resolution in Security Policy Rules
A firewall is the main classic tool for monitoring and managing the network traffic on a local network. Its task is to compare the network traffic passing through it with the established security rules.
Sergey V. Morzhov, Valeriy A. Sokolov
doaj +1 more source
Policy based security architecture for software defined networks [PDF]
As networks expand in size and complexity, they pose greater administrative and management challenges. Software Defined Networks (SDN) offer a promising approach to meeting some of these challenges. In this paper, we propose a policy driven security architecture for securing end to end services across multiple SDN domains.
Vijay Varadharajan +3 more
openaire +2 more sources
Chemical Enterprise Network Construction and Network Security Solution
With the informatization process of the chemical industry deepening and the scale of chemical enterprise network gradually expanding, it has brought about the problems of network and information security in chemical enterprises.
Hong Zhang, Pei Li, Jie Zhang
doaj +1 more source
Tunneling Activities Detection Using Machine Learning Techniques
Tunnel establishment, like HTTPS tunnel or related ones, between a computer protected by a security gateway and a remote server located outside the protected network is the most effective way to bypass the network security policy.
Fabien Allard +3 more
doaj +1 more source
Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience.
Alejandro Molina Zarca +4 more
doaj +1 more source
The advent of the fourth industrial revolution and connection with devices and sensors produced extensive arbitrary, discordant data in IIoT platforms.
Anamika Singh +4 more
doaj +1 more source
Design and Application Prospects of Zero-Trust Architecture for Near-Space Networks [PDF]
The unique position of near space makes its network, centered around various near-space vehicles, a critical component of the integrated air-space-ground network.
Qiao Liu +4 more
doaj +1 more source

