[HTML][HTML] Misconfiguration in O-RAN: Analysis of the impact of AI/ML
User demand on network communication infrastructure has never been greater with
applications such as extended reality, holographic telepresence, and wireless brain …
applications such as extended reality, holographic telepresence, and wireless brain …
A research review of OpenFlow for datacenter networking
J Miguel-Alonso - IEEE Access, 2022 - ieeexplore.ieee.org
OpenFlow is a network device management and monitoring protocol, as well as a switch
specification, that has enabled research, experimentation and deployment of software …
specification, that has enabled research, experimentation and deployment of software …
Privacy-preserving using homomorphic encryption in Mobile IoT systems
The data privacy concerns are increasingly affecting the Internet of things (IoT) and artificial
intelligence (AI) applications, in which it is very challenging to protect the privacy of the …
intelligence (AI) applications, in which it is very challenging to protect the privacy of the …
DDoS defense for IoT: A Stackelberg game model-enabled collaborative framework
The proliferation of Distributed Denial of Service (DDoS) attacks in Internet of Things (IoT)
not only threatens the security of digital devices and infrastructure but also severely …
not only threatens the security of digital devices and infrastructure but also severely …
Homomorphic encryption algorithm providing security and privacy for IoT with optical fiber communication
Data privacy is becoming more important as the internet of things (IoT) rapidly expands.
There are significant consequences for the broad adoption of the internet of things …
There are significant consequences for the broad adoption of the internet of things …
SDN 控制层泛洪防御机制研究: 检测与缓解
周启钊, 于俊清, 李冬 - 通信学报, 2021 - infocomm-journal.com
针对SDN 控制层中的欺骗式泛洪防御问题, 提出控制器防御机制(CDM), 主要包括基于关键特征
多分类的泛洪检测机制和基于SAVI 的泛洪缓解机制2 个方面. 在泛洪检测方面提出控制层泛洪 …
多分类的泛洪检测机制和基于SAVI 的泛洪缓解机制2 个方面. 在泛洪检测方面提出控制层泛洪 …
Exploring Data Traceability Methods in Information Management within Universities: An Action Research and Case Study Approach
H Chen, Z Hu - IEEE Access, 2024 - ieeexplore.ieee.org
As university information management grows increasingly complex, the demand for
seamless data sharing and interaction across various departments and faculties has surged …
seamless data sharing and interaction across various departments and faculties has surged …
Monitoring openflow virtual networks via coordinated switch-based traffic mirroring
As network virtualization becomes ubiquitous, legacy hardware-based traffic monitoring
systems are no longer viable for dynamic traffic inspection at arbitrary locations in virtual …
systems are no longer viable for dynamic traffic inspection at arbitrary locations in virtual …
Performance Comparison of SDN Wireless Network Under Floodlight and POX Controllers
AESF Ahmed, HA Elsayed - 2022 13th International …, 2022 - ieeexplore.ieee.org
Future networks consist of heterogenous platforms of different types. Moreover, there is a
great rapid growth in mobile communication, Machine-to-Machine (M2M) communications …
great rapid growth in mobile communication, Machine-to-Machine (M2M) communications …
PPSSDHE: privacy preservation in smartphone sensors data using ElGamal homomorphic encryption
S Manimaran, DU Priya - International Journal of Sensor …, 2024 - inderscienceonline.com
Smartphone sensors act as vital sensing organs, enabling various mobile applications and
activities. However, protecting the privacy of sensor data presents significant challenges that …
activities. However, protecting the privacy of sensor data presents significant challenges that …