[HTML][HTML] Load balancing between fog and cloud in fog of things based platforms through software-defined networking
Abstract The Internet of Things (IoT) allows for the coordination and orchestration of a large
number of physical and virtual objects connected to the Internet. Sensors used in IoT …
number of physical and virtual objects connected to the Internet. Sensors used in IoT …
Traffic-aware dynamic controller placement in SDN using NFV
G Ramya, R Manoharan - The Journal of Supercomputing, 2023 - Springer
Abstract Software-Defined Networking (SDN) and Network Function Virtualization (NFV) are
promising technologies for delivering software-based networks to the user community. The …
promising technologies for delivering software-based networks to the user community. The …
[HTML][HTML] Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security
AK Alnaim - International Journal of Information Security, 2024 - Springer
Abstract 5G, the current generation of communication networks is based on the standards
defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define …
defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define …
[HTML][HTML] Enhancing DDoS detection in SDIoT through effective feature selection with SMOTE-ENN
Internet of things (IoT) facilitates a variety of heterogeneous devices to be enabled with
network connectivity via various network architectures to gather and exchange real-time …
network connectivity via various network architectures to gather and exchange real-time …
Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm
RJ Anandhi - International Journal of Information Technology, 2024 - Springer
The rapid evolution of network traffic created various problems in detecting Distributed
Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) …
Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) …
[PDF][PDF] Core-based approach to measure pairwise layer similarity in multiplex network
Most of the recent works on network science are focused on investigating various
interactions among a set of entities present in a system that can be represented by multiplex …
interactions among a set of entities present in a system that can be represented by multiplex …
[PDF][PDF] ENHANCING DATA TRANSMISSION FOR INTELLIGENT INFORMATION SYSTEMS USING SDN TECHNIQUE AND MACHINE LEARNING ALGORITHM
MS YADAM, H EL-BAKRY… - Journal of Theoretical …, 2023 - researchgate.net
Intelligent information systems, which have recently undergone development and
complexity, are now indispensable to the entire world. The networking strategy has …
complexity, are now indispensable to the entire world. The networking strategy has …
An OpenFlow-Based Approach to Cloud Architecture for Detecting Network Security Events
Y Zheng - 2023 3rd International Conference on Smart …, 2023 - ieeexplore.ieee.org
With the rapid development of computer technology and the rapid expansion of network
scale, the security requirements of network resources have also increased. The design and …
scale, the security requirements of network resources have also increased. The design and …
Knowledge, Attitude and Practice towards COVID-19 prevention among outpatients from a Private Dental Institution-A Pilot study
P Sivasubramanian, DS Sakthi - … International Conference on …, 2023 - ieeexplore.ieee.org
In order to slow the COVID-19 pandemic's rapid spread and put an end to it, the world needs
to take extraordinary action. The knowledge, attitude, and practises (KAP) of outpatients …
to take extraordinary action. The knowledge, attitude, and practises (KAP) of outpatients …
Analysis Of Fingerprint As A Identification Tool In Forensic-Survey Based Study
H Tamilmani, A Arthanari - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Fingerprints are unique impressions left behind when a finger touches a surface, and they
have been used in forensic studies since the late 19th century to identify individuals …
have been used in forensic studies since the late 19th century to identify individuals …