We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. A novel frame switching model based on virtual MAC in SDN

    MAC address spoofing has plagued LAN communication for a long time. Many attacks use it as a springboard to carry out subsequent attacks. The main...

    Guangjia Song, Jianhua Hu, Hui Wang in International Journal of Information Security
    Article Open access 08 March 2023
  2. Sub Data Path Filtering Protocol for Subscription of Event Parts and Event Regeneration in Pub/Sub Pattern

    Pub/Sub is a common pattern allowing a producer to publish events to consumers. In types of Pub/Sub, structure of an event is either identified by...
    Serif Inanir, Yilmaz Kemal Yuce in Advanced Engineering, Technology and Applications
    Conference paper 2024
  3. A particle swarm optimization routing scheme for wireless sensor networks

    For the energy consumption problem among nodes in wireless sensor networks (WSNs), a particle swarm optimization routing (PSOR) scheme is proposed in...

    Guoxiang Tong, Shushu Zhang, ... Guisong Yang in CCF Transactions on Pervasive Computing and Interaction
    Article 20 December 2022
  4. Research on Dos Attack Simulation and Detection in Low-Orbit Satellite Network

    Low-Earth Orbit (LEO) satellite networks are increasingly becoming the communication infrastructure of critical sectors because of their extensive...
    Nannan **e, Lijia **e, ... Dongbo Zhao in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  5. Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches

    Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding,...

    **anfeng Li, Haoran Sun, Yan Huang in Journal of Network and Systems Management
    Article 18 June 2024
  6. sRetor: a semi-centralized regular topology routing scheme for data center networking

    The performance of the data center network is critical for lowering costs and increasing efficiency. The software-defined networks (SDN) technique...

    Zequn Jia, Qiang Liu, Yantao Sun in Journal of Cloud Computing
    Article Open access 25 October 2023
  7. Application of improved ant colony algorithm in load balancing of software-defined networks

    Software-defined networking (SDN) separates the forwarding plane and control plane of the network equipment, adopts a centralized control mode to...

    Huijun Zheng, Jianlan Guo, ... Yuqiang Chen in The Journal of Supercomputing
    Article 27 November 2022
  8. Attitude-Aware Based Geographical Opportunity Routing Protocol for Floating Wireless Sensor Network

    Wireless sensor devices are increasingly deployed in both terrestrial and aquatic environments. In wireless sensor networks, routing protocols are...
    Yuting Wang, Chaoyi Zhou, ... Yong Yang in Wireless Sensor Networks
    Conference paper 2024
  9. Multi-objective NSGA-II optimization framework for UAV path planning in an UAV-assisted WSN

    The recent technological advancements such as IoT-enabled sensor nodes, Global Positioning System, Wi-Fi transceivers, and lightweight lithium-ion...

    Manish Kumar Singh, Amit Choudhary, ... Anurag Verma in The Journal of Supercomputing
    Article 20 July 2022
  10. Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure

    In edge computing, repetitive computations are a common occurrence. However, the traditional TCP/IP architecture used in edge computing fails to...

    Atiyeh Javaheri, Ali Bohlooli, Kamal Jamshidi in Computing
    Article 03 July 2024
  11. An efficient multicast multi-rate reinforcement learning based opportunistic routing algorithm

    Multicasting through device-to-device communication (MD2D) is a promising solution for handling the heavy load caused by the extraordinary high...

    Mahshid Hashemi, Neda Moghim in Multimedia Tools and Applications
    Article 09 March 2023
  12. Fuzzy intelligence based V2V routing protocol in Internet of Vehicles: a cross-layer approach

    Internet of Vehicles (IoV), a vital component in intelligent transportation systems, supports diverse applications ranging from periodic safety...

    Moyukh Laha, Raja Datta in Computing
    Article 29 July 2023
  13. ACI Fundamentals: Underlay Infrastructure

    In this chapter, you will focus on establishing a proper understanding of the main ACI components: the underlay network infrastructure and APIC...
    Jan Janovic in Cisco ACI: Zero to Hero
    Chapter 2023
  14. Insights into SAV Implementations in the Internet

    Source Address Validation (SAV) is designed to block packets with spoofed IP addresses. Obtaining insights into the deployment and implementation of...
    Haya Schulmann, Shujie Zhao in Passive and Active Measurement
    Conference paper 2024
  15. Functional Properties and Scalability

    In Chaps. 2–5, we have presented the main components of the SCION architecture: beacon service, certificate service, and path service; the concept of...
    Laurent Chuat, Markus Legner, ... Adrian Perrig in The Complete Guide to SCION
    Chapter 2022
  16. On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks

    Software-Defined Networking (SDN) has attracted much attention from research and industrial communities recently as it is more agile and flexible...

    Nguyen Huu Thanh, Nguyen Ngoc Tuan, ... Florian Wamser in Journal of Network and Systems Management
    Article 29 March 2023
  17. Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration

    The phenomenon of diversified terminal structures is common in the Industrial Internet of Things (IIoT), and the information transmission methods...

    Mingshi Li, Zhenyu Yin, ... Mengjia Lian in Neural Computing and Applications
    Article 15 April 2021
  18. Control Plane

    This chapter describes SCION's control plane, whose main purpose is to create and manage path segments, which can then be combined into forwarding...
    Laurent Chuat, Markus Legner, ... Adrian Perrig in The Complete Guide to SCION
    Chapter 2022
  19. Bungee-ML: A Cross-Plane Approach for a Collaborative Defense Against DDoS Attacks

    Network services and applications are targeted by different types of attacks on a daily basis. One of the most common and devastating types is...

    Libardo Andrey Quintero González, Lucas Castanheira, ... Luciano Paschoal Gaspary in Journal of Network and Systems Management
    Article 22 August 2023
  20. A survey on interest packet flooding attacks and its countermeasures in named data networking

    The current Internet architecture is not suitable for the growing data (generated from billions of devices) and contents (stored in multiple...

    Rabari Jeet, P. Arun Raj Kumar in International Journal of Information Security
    Article 23 April 2022
Did you find what you were looking for? Share feedback.