Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Yun Zhan Cai"'
Autor:
Chia-Ying Lin, Hui-Ling Chang, Mong-Ting Wu, Yun-Zhan Cai, Yu-Ting Wang, Lo-An Chen, Meng-Hsun Tsai, Ren-Shiou Liu
Publikováno v:
IEEE Access, Vol 7, Pp 332-346 (2019)
Nowadays, Over-The-Top (OTT) voice call service has become more popular than other Voice over Internet Protocol services provided by mobile operators due to cheaper costs. For devices with more than one network interfaces, the OTT software may need t
Externí odkaz:
https://doaj.org/article/a4518824d7824bd2a9471f30effe2fca
Publikováno v:
Wireless Networks. 28:587-602
Publikováno v:
2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS).
Autor:
Chia-Ying Lin, Hui-Ling Chang, Mong-Ting Wu, Yun-Zhan Cai, Yu-Ting Wang, Lo-An Chen, Meng-Hsun Tsai, Ren-Shiou Liu
Publikováno v:
IEEE Access, Vol 7, Pp 175020-175020 (2019)
In the above paper [3], two references [1], [2]weremissing. The first sentence of Section III should read “This section proposes an analytical model for DHM, which is based on the mathematical analysis in [1] and [2]. Compared to [1] and [2], DHM h
Externí odkaz:
https://doaj.org/article/5d3a44d93b434a218d3e282e78917339
Publikováno v:
APNOMS
SYN flooding and UDP flooding are common malicious attacks in networks. The attacks not only consume a large amount of network bandwidth and system resources of the target server but also cause network paralysis. To defend the network against the SYN
Autor:
Yu-Ting Wang, Lo-An Chen, Ren-Shiou Liu, Meng-Hsun Tsai, Chia-Ying Lin, Yun-Zhan Cai, Mong-Ting Wu, Hui-Ling Chang
Publikováno v:
IEEE Access, Vol 7, Pp 332-346 (2019)
Nowadays, Over-The-Top (OTT) voice call service has become more popular than other Voice over Internet Protocol services provided by mobile operators due to cheaper costs. For devices with more than one network interfaces, the OTT software may need t
Publikováno v:
ICS
With the development of the Internet of Things (IoT), the amount of IoT devices in the network is growing. According to a report by McKinsey Global Institute, there will be 1 trillion IoT devices connected to the Internet by 2025. Faced with a large
Publikováno v:
ICS
With the advancement of wired and wireless communication technologies, the Internet of Things (IoT) devices are also increasing. Hackers exploit a massive amount of IoT devices, which lack security protection for specific purposes. Distributed denial
Publikováno v:
GLOBECOM
Software-defined Network (SDN) is considered as a promising technology to provide a flexible network for 5G. However, as the resource of flow entries in switches is limited in SDN, a novel flow management method is required when facing massive amount
Publikováno v:
Blockchain
Smart contracts on the Ethereum blockchain can be utilized as secure places to store cryptocurrency if they are designed carefully. However, while cryptocurrency is kept in smart contracts, such as being paid to a blockchain service, no extra profit