[HTML][HTML] Misconfiguration in O-RAN: Analysis of the impact of AI/ML

NM Yungaicela-Naula, V Sharma, S Scott-Hayward - Computer Networks, 2024 - Elsevier
User demand on network communication infrastructure has never been greater with
applications such as extended reality, holographic telepresence, and wireless brain …

A research review of OpenFlow for datacenter networking

J Miguel-Alonso - IEEE Access, 2022 - ieeexplore.ieee.org
OpenFlow is a network device management and monitoring protocol, as well as a switch
specification, that has enabled research, experimentation and deployment of software …

Privacy-preserving using homomorphic encryption in Mobile IoT systems

W Ren, X Tong, J Du, N Wang, SC Li, G Min… - Computer …, 2021 - Elsevier
The data privacy concerns are increasingly affecting the Internet of things (IoT) and artificial
intelligence (AI) applications, in which it is very challenging to protect the privacy of the …

DDoS defense for IoT: A Stackelberg game model-enabled collaborative framework

X Chen, L Xiao, W Feng, N Ge… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The proliferation of Distributed Denial of Service (DDoS) attacks in Internet of Things (IoT)
not only threatens the security of digital devices and infrastructure but also severely …

Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication

AS Alqahtani, Y Trabelsi, P Ezhilarasi… - Optical and Quantum …, 2024 - Springer
Data privacy is becoming more important as the internet of things (IoT) rapidly expands.
There are significant consequences for the broad adoption of the internet of things …

SDN 控制层泛洪防御机制研究: 检测与缓解

周启钊, 于俊清, 李冬 - 通信学报, 2021 - infocomm-journal.com
针对SDN 控制层中的欺骗式泛洪防御问题, 提出控制器防御机制(CDM), 主要包括基于关键特征
多分类的泛洪检测机制和基于SAVI 的泛洪缓解机制2 个方面. 在泛洪检测方面提出控制层泛洪 …

Exploring Data Traceability Methods in Information Management within Universities: An Action Research and Case Study Approach

H Chen, Z Hu - IEEE Access, 2024 - ieeexplore.ieee.org
As university information management grows increasingly complex, the demand for
seamless data sharing and interaction across various departments and faculties has surged …

Monitoring openflow virtual networks via coordinated switch-based traffic mirroring

S Sadrhaghighi, M Dolati, M Ghaderi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As network virtualization becomes ubiquitous, legacy hardware-based traffic monitoring
systems are no longer viable for dynamic traffic inspection at arbitrary locations in virtual …

Performance Comparison of SDN Wireless Network Under Floodlight and POX Controllers

AESF Ahmed, HA Elsayed - 2022 13th International …, 2022 - ieeexplore.ieee.org
Future networks consist of heterogenous platforms of different types. Moreover, there is a
great rapid growth in mobile communication, Machine-to-Machine (M2M) communications …

PPSSDHE: privacy preservation in smartphone sensors data using ElGamal homomorphic encryption

S Manimaran, DU Priya - International Journal of Sensor …, 2024 - inderscienceonline.com
Smartphone sensors act as vital sensing organs, enabling various mobile applications and
activities. However, protecting the privacy of sensor data presents significant challenges that …