Realguard: A lightweight network intrusion detection system for IoT gateways
Cyber security has become increasingly challenging due to the proliferation of the Internet of
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …
Cloud–edge microservices architecture and service orchestration: An integral solution for a real-world deployment experience
L Roda-Sanchez, C Garrido-Hidalgo, F Royo… - Internet of Things, 2023 - Elsevier
After some years in which information management has been centralized in cloud platforms,
the need to implement architectures that perform more efficient and intelligent management …
the need to implement architectures that perform more efficient and intelligent management …
SDN-based network slicing mechanism for a scalable 4G/5G core network: A kubernetes approach
Managing the large volumes of IoT and M2M traffic requires the evaluation of the scalability
and reliability for all the components in the end-to-end system. This includes connectivity …
and reliability for all the components in the end-to-end system. This includes connectivity …
[HTML][HTML] A qualitative and quantitative analysis of container engines
L Baresi, G Quattrocchi, N Rasi - Journal of Systems and Software, 2024 - Elsevier
Containerization is a virtualization technique that allows one to create and run executables
consistently on any infrastructure. Compared to virtual machines, containers are lighter since …
consistently on any infrastructure. Compared to virtual machines, containers are lighter since …
Containerized Edge Architecture for Centralized Industry 4.0 Fleet Management
A Garcia, J Tardos, JL Ferrando… - 2023 IEEE 9th World …, 2023 - ieeexplore.ieee.org
Industry 4.0 paradigm has merged OT and IT domains, increasing the requirements to
capture, storage, visualize and analyze industrial data. Furthermore, companies monitoring …
capture, storage, visualize and analyze industrial data. Furthermore, companies monitoring …
[PDF][PDF] Cercetări și soluții pentru rețelele de contorizare inteligentă
PO Negîrla - 2022 - dspace.upt.ro
Universitatea Politehnica Timișoara a inițiat seriile de mai sus în scopul diseminării
expertizei, cunoștințelor și rezultatelor cercetărilor întreprinse în cadrul Școlii doctorale a …
expertizei, cunoștințelor și rezultatelor cercetărilor întreprinse în cadrul Școlii doctorale a …
NREL Stratus-Enabling Workflows to Fuse Data Streams, Modeling, Simulation, and Machine Learning
D Rager, A Andersen - Smoky Mountains Computational Sciences and …, 2021 - Springer
Integrating cloud services into advanced computing facilities provides significant new
capabilities and offers several advantages over focusing solely on traditional high …
capabilities and offers several advantages over focusing solely on traditional high …
[PDF][PDF] AN ANALYSIS OF SOFTWARE DEPLOYMENT SECURITY FOR INTERNET OF THINGS DEVICES
I Culic, A Vochescu, R Rughinis - scientificbulletin.upb.ro
The adoption of Internet of Things in commercial and industrial systems exposes products to
a new set of security issues, as what used to be isolated devices are now connected to the …
a new set of security issues, as what used to be isolated devices are now connected to the …