Results 61 to 70 of about 18,286 (189)
Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis [PDF]
Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to ...
Johnson, Christopher W. +2 more
core
BACH1, a basic leucine zipper protein ubiquitously expressed in mammalian tissues, plays a critical role in the regulation of oxidative stress, cell cycle progression, heme homeostasis, and immune responses. It is implicated in cardiovascular diseases, cancer progression, neurodegenerative disorders, and many other diseases.
Xiangxiang Wei +9 more
wiley +1 more source
Simple Network Management Protocol (SNMP) adalah sebuah protokol yang digunakan untuk kebutuhan monitoring pada jaringan komputer. Dalam bekerja, SNMP terdiri dari Network Management Station (NMS) atau manager dan SNMP agent.
Muazam Nugroho +2 more
doaj
The Indispensable Role of Software Ecosystem Services
Software Ecosystem Services (SES) are defined as the essential conditions and processes enabling innovation and value creation within software ecosystems. SES are categorized into four primary types: Provisioning, Regulating, Cultural, and Supporting Services. The study identifies potential risks to sustainability due to dominant players and highlights
Casper van Schothorst +2 more
wiley +1 more source
Variations in Wireless Network Topology Inference: Recent Evolution, Challenges, and Directions
This paper first presents an overview of the basic concepts and significance of network topology inference, followed by a brief review of cooperative methods. It then provides a comprehensive summary of non‐cooperative methods. To facilitate performance comparison, a unified dataset and evaluation metrics are employed to analyse four representative non‐
Wenbo Du +5 more
wiley +1 more source
XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments [PDF]
XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data.
El-Khouly, Mahmoud +2 more
core +3 more sources
The article provides a comprehensive analysis of machine learning models to enhance the detection of distributed denial of service (DDoS) attacks. It addresses different application scenarios and a multiclass classification problem involving 11 types of DDoS attacks and regular network traffic.
Paulo Victor +6 more
wiley +1 more source
New dimensions in SNMP Protocol in Romania
In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP) default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy
Alice Nastovici
doaj
Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán +2 more
wiley +1 more source
Abnormal Traffic Detection Method Based on DCNN‐GRU Architecture in SDN
In response to the centralized single‐architecture abnormal traffic detection method in Software Defined Network (SDN), which consumes massive computational and network resources, and may lead to the decline of service quality of SDN network, this paper proposes a large‐scale abnormal traffic detection method of SDN network based on Distributed ...
Xueyuan Duan +7 more
wiley +1 more source

