-
21
Mathematical Model Used to Compute Packet Energy Consumption-Based Control Topology for WSN
Published 2025-05-01Get full text
Article -
22
AN APPROACH PRIORITIZING THE CAUSAL FACTORS OF LARGE SCALED DATA USING SOFT COMPUTING: A CASE STUDY
Published 2021-12-01“…Often it has been observed that the traditional computing mechanisms linked with the devices like routers equipped with specific infrastructures as well as services may not be adequate for implementation due to lack of flexibilities. …”
Get full text
Article -
23
Penerapan Static VLAN Dan Access List Untuk Meningkatkan Keamanan Jaringan
Published 2019-10-01Get full text
Article -
24
The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack
Published 2021-06-01Get full text
Article -
25
iFPH: WIRELESS CONTROL OF SOUND
Published 2012-12-01“…It combines different pieces of hardware and software, and the computer is controlled through a nano control surface or even a smartphone mediated by a nano wireless router. …”
Get full text
Article -
26
Komparasi Static Routing Menggunakan IPv4 Dengan IPv6 Guna Meningkatkan Quality Of Service
Published 2022-01-01Get full text
Article -
27
-
28
Implementasi Firewall Mikrotik dalam Pembatasan Akses Situs Terlarang di RT/RW Net
Published 2025-07-01Get full text
Article -
29
Federated Learning-Assisted Coati Deep Learning-Based Model for Intrusion Detection in MANET
Published 2024-11-01Get full text
Article -
30
-
31
-
32
Facing the Reality: Validation of Energy Saving Mechanisms on a Testbed
Published 2014-01-01Get full text
Article -
33
Enhancements of G3-PLC Technology for Smart-Home/Building Applications
Published 2013-01-01Get full text
Article -
34
Effect of Load Balancing Bonding and Failover on Speed, Latency, Average, and Packet Loss
Published 2024-11-01“…The configuration was carried out on two routers connected with three virtual cables that function as load balancing bonding, for the computer to function as a load balancing bonding test. …”
Get full text
Article -
35
-
36
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
37
Energy-efficient selection of cluster headers in wireless sensor networks
Published 2018-03-01Get full text
Article -
38
-
39
Design of an IPTV Multicast System for Internet Backbone Networks
Published 2010-01-01“…A recently proposed Recursive Fair Stochastic Matrix Decomposition algorithm used to compute near-perfect transmission schedules for each IP router. …”
Get full text
Article -
40
Reverse Engineering Segment Routing Policies and Link Costs With Inverse Reinforcement Learning and EM
Published 2025-01-01“…Network routing is a core functionality in computer networks that holds significant potential for integrating newly developed techniques with minimal software effort through the use of Software-Defined Networking (SDN). …”
Get full text
Article