Zobrazeno 1 - 10
of 12
pro vyhledávání: '"MohammadReza Soltanaghaei"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-15 (2024)
Abstract Identifying influential nodes is one of the basic issues in managing large social networks. Identifying influence nodes in social networks and other networks, including transportation, can be effective in applications such as identifying the
Externí odkaz:
https://doaj.org/article/072b721adde94317a8645ca0eccc8e57
Publikováno v:
Journal of Computer Networks and Communications, Vol 2016 (2016)
Mobile ad hoc network (MANET) is one of the most widely used networks, which has attracted attentions, having features such as limited energy resources, limited bandwidth, and security weaknesses due to lack of a central infrastructure. Safe and suit
Externí odkaz:
https://doaj.org/article/65d744effd3843efb73c15ac6b122cdf
Publikováno v:
Wireless Networks. 28:3477-3491
Publikováno v:
The Journal of Supercomputing. 78:16136-16166
Software-defined networks separate the controlling and data layers in computer networks. It will enable central management and the ability to define policies and apply them to network hardware. Traffic engineering, which measures and manages network
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef885cdc9e5ae8225184b7b12fe427fe
https://doi.org/10.21203/rs.3.rs-1887790/v1
https://doi.org/10.21203/rs.3.rs-1887790/v1
Publikováno v:
Majlesi Journal of Electrical Engineering. 15:1-8
DDoS (Distributed Denial-of-Service) attacks are among the cyberattacks that are increasing day by day and have caused problems for computer network servers. With the advent of SDN networks, they are not immune to these attacks, and due to the softwa
Publikováno v:
The Journal of Supercomputing. 77:5806-5839
Due to extensive web applications, sentiment classification (SC) has become a relevant issue of interest among text mining experts. The extensive online reviews prevent the application of effective models to be used in companies and in the decision m
Publikováno v:
The Journal of Supercomputing. 77:2383-2415
The distributed denial-of-service (DDoS) attack is a security challenge for the software-defined network (SDN). The different limitations of the existing DDoS detection methods include the dependency on the network topology, not being able to detect
Software Defined Networking (SDN) is a new network architecture in which network control is separated from direct traffic and is programmed directly. Any change in network information and its configuration can be easily implemented in software by usi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::197d20a8216bf4049b0ef52da376216d
https://doi.org/10.21203/rs.2.24212/v1
https://doi.org/10.21203/rs.2.24212/v1
Publikováno v:
Journal of Computer Networks and Communications, Vol 2016 (2016)
Mobile ad hoc network (MANET) is one of the most widely used networks, which has attracted attentions, having features such as limited energy resources, limited bandwidth, and security weaknesses due to lack of a central infrastructure. Safe and suit