Results 61 to 70 of about 18,286 (189)

Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis [PDF]

open access: yes, 2012
Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to ...
Johnson, Christopher W.   +2 more
core  

The Multifaceted Roles of BACH1 in Disease: Implications for Biological Functions and Therapeutic Applications

open access: yesAdvanced Science, Volume 12, Issue 10, March 13, 2025.
BACH1, a basic leucine zipper protein ubiquitously expressed in mammalian tissues, plays a critical role in the regulation of oxidative stress, cell cycle progression, heme homeostasis, and immune responses. It is implicated in cardiovascular diseases, cancer progression, neurodegenerative disorders, and many other diseases.
Xiangxiang Wei   +9 more
wiley   +1 more source

Design of the Network Monitoring Applications Using SNMP (Simple Network Management Protocol) with Early Warning System and Network Mapping

open access: yesJurnal Teknik ITS, 2014
Simple Network Management Protocol (SNMP) adalah sebuah protokol yang digunakan untuk kebutuhan monitoring pada jaringan komputer. Dalam bekerja, SNMP terdiri dari Network Management Station (NMS) atau manager dan SNMP agent.
Muazam Nugroho   +2 more
doaj  

The Indispensable Role of Software Ecosystem Services

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
Software Ecosystem Services (SES) are defined as the essential conditions and processes enabling innovation and value creation within software ecosystems. SES are categorized into four primary types: Provisioning, Regulating, Cultural, and Supporting Services. The study identifies potential risks to sustainability due to dominant players and highlights
Casper van Schothorst   +2 more
wiley   +1 more source

Variations in Wireless Network Topology Inference: Recent Evolution, Challenges, and Directions

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper first presents an overview of the basic concepts and significance of network topology inference, followed by a brief review of cooperative methods. It then provides a comprehensive summary of non‐cooperative methods. To facilitate performance comparison, a unified dataset and evaluation metrics are employed to analyse four representative non‐
Wenbo Du   +5 more
wiley   +1 more source

XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments [PDF]

open access: yes, 2014
XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data.
El-Khouly, Mahmoud   +2 more
core   +3 more sources

Distributed Denial of Service Detection: Enhancing Machine Learning Models for Multiclass Classification

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
The article provides a comprehensive analysis of machine learning models to enhance the detection of distributed denial of service (DDoS) attacks. It addresses different application scenarios and a multiclass classification problem involving 11 types of DDoS attacks and regular network traffic.
Paulo Victor   +6 more
wiley   +1 more source

New dimensions in SNMP Protocol in Romania

open access: yesEIRP Proceedings, 2009
In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP) default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy
Alice Nastovici
doaj  

Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids

open access: yesIET Smart Grid, Volume 8, Issue 1, January/December 2025.
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán   +2 more
wiley   +1 more source

Abnormal Traffic Detection Method Based on DCNN‐GRU Architecture in SDN

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
In response to the centralized single‐architecture abnormal traffic detection method in Software Defined Network (SDN), which consumes massive computational and network resources, and may lead to the decline of service quality of SDN network, this paper proposes a large‐scale abnormal traffic detection method of SDN network based on Distributed ...
Xueyuan Duan   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy