Search alternatives:
networks » network (Expand Search)
Showing 41 - 60 results of 836 for search 'Computer networks Security features.', query time: 0.12s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44

    Research on SDN Architecture and Security by Shu1ing Wang, Jihan Li, Yunyong Zhang, Bingyi Fang

    Published 2013-03-01
    “…With the rapid deve1opment of c1oud computing and mobi1e internet, the features that network exhibits, such as diversity, dec1are for urgent requirements for sca1abi1ity, manageabi1ity and security of the data center.The SDN architecture shows a promising way of dea1ing with the above requirements of network through revo1utionary innovation of the traditiona1 network architecture, which attracts great interest of companies and research institutes.However, according to the recent research and progress of SDN, security prob1em has not been addressed, which wi11 be a significant issue.Based on the situation, the basis of SDN, inc1uding the origination, architecture, standardization work and standardized protoco1, were described, and the security issue was a1so ana1yzed.In the security part, the exhibiting new features of security prob1em for SDN, were ana1yzed, by 1isting the undergoing work, and then the security threats in SDN were conc1uded.Fina11y, a suggested architecture for security research of SDN was proposed.…”
    Get full text
    Article
  5. 45
  6. 46
  7. 47

    Neuro-Driven Agent-Based Security for Quantum-Safe 6G Networks by Mohammed Alwakeel

    Published 2025-06-01
    “…Around the same time that 6G networks will be launched, advances in quantum computing could challenge existing cryptographic security. …”
    Get full text
    Article
  8. 48
  9. 49
  10. 50
  11. 51

    TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks by Junqi Duan, Dong Yang, Haoqing Zhu, Sidong Zhang, Jing Zhao

    Published 2014-01-01
    “…In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor networks (WSNs), which is one of the most popular network technologies for smart city. …”
    Get full text
    Article
  12. 52
  13. 53
  14. 54
  15. 55
  16. 56

    CAA-RF: An Anomaly Detection Algorithm for Computing Power Blockchain Networks by Shifeng Jia, Yating Zhao, Yang Zhang, Bin Jia, Wenjuan Lian

    Published 2025-05-01
    “…As a distributed communication and storage system, blockchain forms a Computing Power Blockchain Network (CPBN) by integrating computing nodes and network resources. …”
    Get full text
    Article
  17. 57

    Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme by Eman Abouelkheir

    Published 2024-01-01
    “…Multiple groups of UAVs, through appropriate interaction and concerted procedures, can achieve these objectives. The unpredictable features of UAVs and their reliance on unprotected and widely available wireless networks create challenges in establishing secure communication between a private edge cloud and a UAV. …”
    Get full text
    Article
  18. 58

    Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism by Nothile C. Masango, Jeffrey O. Agushaka, Mercy C. Amaefule, Olutosin Taiwo, Peiying Zhang, Absalom E. Ezugwu, Kashif Saleem, Aseel Smerat, Laith Abualigah

    Published 2025-03-01
    “…Experimental results demonstrate that this solution significantly enhances security, mitigates latency, and improves network performance compared to existing methods. …”
    Get full text
    Article
  19. 59
  20. 60