Two routers network architecture and scheduling algorithms under packet category classification constraint
暂无分享,去创建一个
[1] Farhan Aadil,et al. An Optimized and Efficient Routing Protocol Application for IoV , 2021 .
[2] Mahdi Jemmali,et al. Fixed Urgent Window Pass for a Wireless Network with User Preferences , 2021, Wireless Personal Communications.
[3] Yudhistira Nugraha,et al. Towards a framework for trustworthy data security level agreement in cloud procurement , 2021, Comput. Secur..
[4] Petros Nicopolitidis,et al. A blockchain-based secure routing protocol for opportunistic networks , 2021, J. Ambient Intell. Humaniz. Comput..
[5] Mahdi Jemmali,et al. Time-slots Transmission Data Algorithms into Network , 2020, 2020 International Conference on Computing and Information Technology (ICCIT-1441).
[6] Jacek Rumiński,et al. A survey of neural networks usage for intrusion detection systems , 2020, Journal of Ambient Intelligence and Humanized Computing.
[7] Christian Damsgaard Jensen,et al. The application of Software Defined Networking on securing computer networks: A survey , 2019, J. Netw. Comput. Appl..
[8] Leszek Lilien,et al. An Approach to Identity Management in Clouds without Trusted Third Parties , 2019, ArXiv.
[9] Qiang Duan Qiang Duan,et al. Network as a Service for Next Generation Internet , 2017 .
[10] Steve Carr,et al. A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party Computation , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[11] Nirvana Meratnia,et al. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers , 2014, Sensors.
[12] G. Padmavathi,et al. A Survey on Various Cyber Attacks and their Classification , 2013, Int. J. Netw. Secur..
[13] Liang Dong,et al. Real-time scheduling with security awareness for packet switched networks , 2012, 2012 IEEE Radio and Wireless Symposium.
[14] William Yurcik,et al. Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs , 2007, ArXiv.
[15] Yi Yang,et al. Generic Threats to Routing Protocols , 2006, RFC.
[16] George Varghese,et al. Network Algorithmics-An Interdisciplinary Approach to Designing Fast Networked Devices , 2004 .
[17] Gabriel Maciá-Fernández,et al. Present and Future of Network Security Monitoring , 2021, IEEE Access.
[18] Mahdi Jemmali,et al. Equity Data Distribution Algorithms on Identical Routers , 2019 .
[19] S. Mercy Shalinie,et al. A survey of distributed denial of service attack , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[20] Pankaj Kumar Sehgal,et al. A Comparative Study of various Secure Routing Protocols based on AODV , 2011 .