Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Ronald Marx"'
Autor:
David Raciti, Renu Sharma, Canhui Wang, Amit Agrawal, Wei-Chang Yang, Ronald Marx, Alina Bruma
Publikováno v:
Nat Mater
Metallic nanoparticles have been used to harvest energy from a light source and transfer it to adsorbed gas molecules, which results in a reduced chemical reaction temperature. However, most reported reactions, such as ethylene epoxidation, ammonia d
Publikováno v:
Microscopy and Microanalysis. 26:1698-1699
Autor:
Ronald Marx, Alexander Oberle, Dirk Scheuermann, Fabien Thomas, Daniel Fages, Frank Gerd Weber, Pedro Larbig
Publikováno v:
AINA
Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. thro
Publikováno v:
CFI
Security is one of the most important aspects in networks which sometimes need network monitoring and measurement tools to identify the source of misbehavior and performance degradation. Monitoring and measurement tools promise to provide critical fu
Publikováno v:
IMIS
The Internet faces many challenges in terms of flexibility (so called IP bottleneck) as well as host-centric addressing, mobility, self-configuration, self-monitoring, and security. Several Future Internet (FI) architectures have been proposed to add
Publikováno v:
Kaleidoscope
Several Future Internet (FI) architectures have been proposed to address the problems of the Internet including flexibility (so called IP bottleneck), host-based addressing (addressing a host rather than the content itself), and security. In this pap
Publikováno v:
NOMS
The original design of the Internet did not take network security aspects into consideration, instead it aimed to facilitate the process of information exchange between end-hosts. Consequently, many protocols that are part of the Internet infrastruct
Publikováno v:
AINTEC
Software Defined Networking (SDN) is a novel approach to allow configuration of networks in real time and a centralized manner. Likewise to legacy network architectures, security mechanisms are used to protect the network and the end-hosts within the
Publikováno v:
AINTEC
Today's data networks are steadily growing in size and complexity. Especially in enterprise networks, these development lead to the requirement of a central network administration. With Software Defined Networking (SDN), this requirement can be fulfi