[HTML][HTML] Computer network simulation with ns-3: A systematic literature review
Complexity of current computer networks, including eg, local networks, large structured
networks, wireless sensor networks, datacenter backbones, requires a thorough study to …
networks, wireless sensor networks, datacenter backbones, requires a thorough study to …
Enhanced CNN-LSTM deep learning for scada IDS featuring hurst parameter self-similarity
Supervisory Control and Data Acquisition (SCADA) systems are crucial for modern industrial
processes and securing them against increasing cyber threats is a significant challenge …
processes and securing them against increasing cyber threats is a significant challenge …
Network coding method for self-similar streaming media flow in wireless mesh network
WF Sheng - … on Engineering Simulation and Intelligent Control …, 2018 - ieeexplore.ieee.org
Wireless network streaming media flow has self-similar characteristics, in order to make
prediction to the sudden self-similar traffic stream media in the network, through the …
prediction to the sudden self-similar traffic stream media in the network, through the …
Métricas para verificación de autoría y emulación de procesos cognitivos
O Pérez-Cortés, H Gómez-Pozos… - … Boletín Científico de …, 2022 - repository.uaeh.edu.mx
Se proponen dos medidas cuantitativas, el parámetro de Hurst y la legibilidad, para realizar
la verificación de autor. Se determinan las cantidades mencionadas para seis diferentes …
la verificación de autor. Se determinan las cantidades mencionadas para seis diferentes …
Presenting a Network-on-Chip Mapping Approach Based on Harmony Search Algorithm
In network-on-chip implementation, mapping can be considered as an important step in
application implementation. The tasks of an application are often represented in the form of …
application implementation. The tasks of an application are often represented in the form of …
[PDF][PDF] Contribuții la îmbunătățirea sistemelor de securitate informațională pe diverse niveluri de comunicație
AD Tudosi - usv.ro
Cercetarea are la bază securitatea informațională, evidențiind evoluția și implementarea
soluțiilor de securitate care au ca fundament firewall-ul distribuit [1]. Acesta reprezintă un …
soluțiilor de securitate care au ca fundament firewall-ul distribuit [1]. Acesta reprezintă un …
[PDF][PDF] Métricas para Verificación de Autorıa y emulación de procesos cognitivos Metrics to assess Authorship Verification and emulation of cognitive processes
O Pérez-Cortés, H Gómez-Pozos, HD Molina-Ruiz - scholar.archive.org
Two quantitative measures, the Hurst parameter and legibility, are proposed to perform
author verification. The quantities mentioned are determined for six different authors …
author verification. The quantities mentioned are determined for six different authors …