Zobrazeno 1 - 10
of 254
pro vyhledávání: '"Nasir Ghani"'
Publikováno v:
IET Networks, Vol 10, Iss 2, Pp 76-87 (2021)
Abstract SYN flood attacks (half‐open attacks) have been proven a serious threat to software‐defined networking (SDN)‐enabled infrastructures. A variety of intrusion detection and prevention systems (IDPS) have been introduced for identifying a
Externí odkaz:
https://doaj.org/article/fe97fb9a8087460bbf10b7ee87856ef0
Publikováno v:
IEEE Access, Vol 8, Pp 167383-167396 (2020)
Network function virtualization (NFV) technology enables service providers to implement software-based network processing functionalities on standard computing servers (nodes). As such, this approach mandates the need for mapping virtual network func
Externí odkaz:
https://doaj.org/article/cabbaf8be4014a5f8461c31534e01ef7
Publikováno v:
IEEE Access, Vol 8, Pp 167665-167683 (2020)
Cloud and fog computing along with network function virtualization technology have significantly shifted the development of network architectures. They yield in reduced capital and operating expenditures, while achieving network flexibility and scala
Externí odkaz:
https://doaj.org/article/bf3c1d6e9f464eff87d7cace6b25a0ab
Publikováno v:
IEEE Access, Vol 7, Pp 63164-63180 (2019)
The continuing increase in air traffic, along with airline operators gradually adopting IP-based network technologies, has led to the transformational concept of e-Enabled or “connected” aircraft. This new framework envisions a single aeronautica
Externí odkaz:
https://doaj.org/article/a67a62f2510e4381bf300e1e3bf29892
Publikováno v:
IEEE Access, Vol 6, Pp 67189-67205 (2018)
The concept of Bitcoin was first introduced by an unknown individual (or a group of people) named Satoshi Nakamoto before it was released as open-source software in 2009. Bitcoin is a peer-to-peer cryptocurrency and a decentralized worldwide payment
Externí odkaz:
https://doaj.org/article/7583e763462f4740b9c1c5580f19b747
Publikováno v:
International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems, Vol 6, Iss 2, Pp 73-79 (2017)
A major challenge for intrusion prevention system (IPS) sensors in today’s Internet is the amount of traffic these devices have to inspect. Hence this paper presents a linear program (LP) for traffic scheduling in multi-sensor environments that all
Externí odkaz:
https://doaj.org/article/46b72e2e8c224eb290c58d382cc463fd
Publikováno v:
IEEE Communications Letters. 26:2096-2100
Publikováno v:
IEEE Transactions on Network and Service Management. 19:1117-1128
Publikováno v:
IEEE Networking Letters. 4:82-86
Publikováno v:
IET Networks, Vol 10, Iss 2, Pp 76-87 (2021)
SYN flood attacks (half‐open attacks) have been proven a serious threat to software‐defined networking (SDN)‐enabled infrastructures. A variety of intrusion detection and prevention systems (IDPS) have been introduced for identifying and preven