Resource provisioning in edge/fog computing: A comprehensive and systematic review
A Shakarami, H Shakarami, M Ghobaei-Arani… - Journal of Systems …, 2022 - Elsevier
Close computing paradigms such as fog and edge have become promising technologies for
mobile applications running on pervasive mobile equipment utilized by a wide range of …
mobile applications running on pervasive mobile equipment utilized by a wide range of …
A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture
Abstract Nowadays, Network Function Virtualization (NFV) is a growing and powerful
technology in the research community and IT world. Traditional computer networks consist of …
technology in the research community and IT world. Traditional computer networks consist of …
ML-based pre-deployment SDN performance prediction with neural network boosting regression
Software defined networking (SDN) has been proposed as an effective approach to improve
network management efficiency and increase network intelligence in various networks …
network management efficiency and increase network intelligence in various networks …
SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks
The simplified data plane of Software-Defined Network (SDN) should be able to process
packets from the entire network. However, the flow table size constrains the data plane …
packets from the entire network. However, the flow table size constrains the data plane …
Network queuing assessment: A method to detect bottlenecks in service function chaining
A Heideker, C Kamienski - IEEE Transactions on network and …, 2022 - ieeexplore.ieee.org
Virtualization and softwarization have driven the widespread adoption of the cloud
computing paradigm, with savings in CAPEX, OPEX, and environmental footprint, by …
computing paradigm, with savings in CAPEX, OPEX, and environmental footprint, by …
A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning
The traditional architecture of networks in Software Defined Networking (SDN) is divided into
three distinct planes to incorporate intelligence into networks. However, this structure has …
three distinct planes to incorporate intelligence into networks. However, this structure has …
[PDF][PDF] Detecting DDoS attacks in software defined networks using deep learning techniques: a survey
Deep Learning (DL) is increasingly being used in Software Defined Networks (SDNs) to
detect Distributed Denial of Service (DDoS) attacks because of high attack detection …
detect Distributed Denial of Service (DDoS) attacks because of high attack detection …
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
S Bhardwaj, M Dave - Telecommunication Systems, 2024 - Springer
This article focuses on the urgent cybersecurity concerns in the Internet of Things (IoT)
environment, highlighting the crucial importance of protecting these networks in the face of …
environment, highlighting the crucial importance of protecting these networks in the face of …
VINEVI: a virtualized network vision architecture for smart monitoring of heterogeneous applications and infrastructures
R Moreira, HGVO da Cunha, LFR Moreira… - … Conference on Advanced …, 2022 - Springer
Monitoring heterogeneous infrastructures and applications is essential to cope with user
requirements properly, but it still lacks enhancements. The well-known state-of-the-art …
requirements properly, but it still lacks enhancements. The well-known state-of-the-art …
Recovering Missing Monitoring Data to Enhance Service Provisioning in the Edge-to-Cloud Continuum
Efficient service provisioning in the Edge-to-Cloud Continuum is of utmost importance for
modern applications. While sensible decisions can be taken if enough monitoring data is …
modern applications. While sensible decisions can be taken if enough monitoring data is …