Machine learning adoption in blockchain-based smart applications: The challenges, and a way forward
In recent years, the emergence of blockchain technology (BT) has become a unique, most
disruptive, and trending technology. The decentralized database in BT emphasizes data …
disruptive, and trending technology. The decentralized database in BT emphasizes data …
Survey on Unified Threat Management (UTM) Systems for Home Networks
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …
professional network administration support, while sophisticated attacks pose enormous …
Machine Learning Adoption in Blockchain-Based Smart Applications
V Suthar, V Bansal, CS Reddy… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The development of blockchain technology (BT) in recent years has made it a distinctive,
revolutionary, and popular innovation. Information security and confidentiality are prioritised …
revolutionary, and popular innovation. Information security and confidentiality are prioritised …
Cloud computing security challenges and related defensive measures: A survey and taxonomy
N Chuka-Maduji, V Anu - SN Computer Science, 2021 - Springer
Existing classification systems of cloud computing security challenges have mostly excluded
human error as a major root cause of cloud security issues. Therefore, we propose a new …
human error as a major root cause of cloud security issues. Therefore, we propose a new …
Application-aware firewall mechanism for software defined networks
FN Nife, Z Kotulski - Journal of Network and Systems Management, 2020 - Springer
Abstract Software-Defined-Networking (SDN) has been recently arising as a new technology
in the IT industry. It is a network architecture that hopes to provide better solutions to most of …
in the IT industry. It is a network architecture that hopes to provide better solutions to most of …
Automated and intelligent systems for next-generation-based smart applications
HR Deekshetha, AK Tyagi - Data Science for Genomics, 2023 - Elsevier
The development of artificial intelligence (AI) systems is fraught with difficulties. These
include limited resources, a lack of field expertise, practicality, and a slew of other …
include limited resources, a lack of field expertise, practicality, and a slew of other …
All-optical matching structure for multi-order modulation formats
Z Shi, X Li, H Shi, Y Liu, K Guo, S Huang - Optical Engineering, 2023 - spiedigitallibrary.org
With the development and popularity of the Internet, network security has become a popular
topic. The traditional solution for screening the security of network information is to convert …
topic. The traditional solution for screening the security of network information is to convert …
Deep Packet Inspection in Firewall Clusters
R Hamilton, W Gray, C Sibanda… - 2020 28th …, 2020 - ieeexplore.ieee.org
Clusters of firewalls is an architecture that can enhance cyber security and protect from
network attackers. Deep Packet Inspection (DPI) is a sophisticated method used in firewalls …
network attackers. Deep Packet Inspection (DPI) is a sophisticated method used in firewalls …
[PDF][PDF] Review of embedded systems security
CC Duru, ACO Azubogu… - UNIZIK Journal of …, 2020 - journals.unizik.edu.ng
Review of embedded systems security Page 1 JEAS ISSN: 1119-8109 Journal of Engineering
and Applied Sciences, Volume 17, Number 2, December 2020, 196-206 Review of embedded …
and Applied Sciences, Volume 17, Number 2, December 2020, 196-206 Review of embedded …
[PDF][PDF] 高速光子防火墙关键技术综述
黄善国, 李新, 唐颖, 郭俊峰 - 通信学报, 2019 - infocomm-journal.com
为了维护光网络安全, 亟需研究部署能够有效处理高速光信号的光子防火墙,
以替代现有的高能耗的电子防火墙. 在介绍光子防火墙原理的基础上, 基于相关运算和逻辑门2 …
以替代现有的高能耗的电子防火墙. 在介绍光子防火墙原理的基础上, 基于相关运算和逻辑门2 …