Results 31 to 40 of about 10,076 (144)

Autonomous Attack Mitigation Through Firewall Reconfiguration

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This graphical abstract shows the workflow of the proposed approach for autonomous attack mitigation through firewall reconfiguration. ABSTRACT Packet filtering firewalls represent a main defense line against cyber attacks that target computer networks daily. However, the traditional manual approaches for their configuration are no longer applicable to
Daniele Bringhenti   +3 more
wiley   +1 more source

Efficient and Reliable Hybrid Cloud Architechture for Big Data

open access: yes, 2013
The objective of our paper is to propose a Cloud computing framework which is feasible and necessary for handling huge data. In our prototype system we considered national ID database structure of Bangladesh which is prepared by election commission of ...
Ahmed, Nova, Tarannum, Narzu
core   +1 more source

Mutation‐Guided Metamorphic Testing of Optimality in AI Planning

open access: yesSoftware Testing, Verification and Reliability, Volume 35, Issue 1, January 2025.
Based on mutation adequacy test suite selection, this article proposes a novel metamorphic testing framework for detecting the lack of optimality in AI plannersg. ABSTRACT Autonomous systems such as space‐ or underwater‐exploration robots or elderly people assistance robots often include an artificial intelligence (AI) planner as a component.
Quentin Mazouni   +4 more
wiley   +1 more source

Interoperable geographically distributed astronomical infrastructures: technical solutions [PDF]

open access: yes, 2017
The increase of astronomical data produced by a new generation of observational tools poses the need to distribute data and to bring computation close to the data.
Bertocco, Sara   +5 more
core   +1 more source

A Study to Optimize Heterogeneous Resources for Open IoT

open access: yes, 2017
Recently, IoT technologies have been progressed, and many sensors and actuators are connected to networks. Previously, IoT services were developed by vertical integration style. But now Open IoT concept has attracted attentions which achieves various IoT
Demizu, Tatsuya   +4 more
core   +1 more source

Reinforcing Cloud Attack Tolerance on a Large Scale: Advanced Blockchain Technologies With Hierarchical Risk and Smart Contracts

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer   +2 more
wiley   +1 more source

AI‐Based Virtual Network Function Embedding for Internet of Things Using Parallel Deep Reinforcement Learning

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
The proposed algorithm is a load‐balanced and energy‐delay aware reinforcement learning approach accompanied by the parallel actor–critic learning strategy for embedding virtual network functions in Internet of Things (IoT) architectures. It handles the dynamic and real‐time nature of the IoT service requests.
Mohammad Javad Rabipour   +1 more
wiley   +1 more source

Docker On Openstack

open access: yes, 2014
Project Specification CERN is establishing a large scale private cloud based on OpenStack as part of the expansion of the computing infrastructure for storing the data coming out of the Large Hadron Collider (LHC) experiments. As the data coming out of the detectors is increasing continuously that needs to be stored in the data center, we need more ...
Agarwal, Nitin, Moreira, Belmiro
openaire   +1 more source

Mobilising new frontiers in digital transformation research: A problematization review

open access: yesInformation Systems Journal, Volume 35, Issue 1, Page 97-139, January 2025.
Abstract In this paper, we mobilise new frontiers in digital transformation (DT) research by deconstructing the literature's underlying assumptions and analysing their correspondence with current theory. To do so, we conduct a problematization review across the fields of IS, strategy and entrepreneurship, organisation theory and management studies, to ...
Amir Ashrafi   +3 more
wiley   +1 more source

Introducing network-aware scheduling capabilities in OpenStack [PDF]

open access: yesProceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), 2015
This paper motivates and describes the introduction of network-aware scheduling capabilities in OpenStack, the open-source reference framework for creating public and private clouds. This feature represents the key for properly supporting the Network Function Virtualization paradigm, particularly when the physical infrastructure features servers ...
LUCREZIA, FRANCESCO   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy