Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security

AK Alnaim - International Journal of Information Security, 2024 - Springer
Abstract 5G, the current generation of communication networks is based on the standards
defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define …

Placement of virtual network functions for network services

BK Umrao, DK Yadav - International Journal of Network …, 2023 - Wiley Online Library
Network function virtualization (NFV) is a name of technology for replacing hardware‐based
network functions with software programs. Virtual network function (VNF) is a software …

Cognitive software defined networking and network function virtualization and applications

S Sharma, A Nag - Future Internet, 2023 - mdpi.com
The emergence of Software-Defined Networking (SDN) and Network Function Virtualization
(NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a …

Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution

H Suwi, N Kara, OA Wahab, C Edstrom… - Journal of Network and …, 2024 - Springer
Abstract Network Function Virtualization (NFV) is a new technology that allows service
providers to improve the cost efficiency of network service provisioning. This is …

Improving Orchestration Service Using gRPC API and P4-Enabled SDN Switch in Cloud Computing Platform: An OpenStack Case.

HK SM, R Sharma - IAENG International Journal of …, 2023 - search.ebscohost.com
Cloud computing platforms like OpenStack use orchestration as a crucial component in the
deployment and administration of cloud services. For the deployment and management of …

Efficient Workflow Scheduling and Cost Optimization for Deadline-Constrained Microservice Applications in Mobile Edge Computing

AR Mahesar, L Xiaoping, DK Sajnani… - … Cooperative Work in …, 2024 - ieeexplore.ieee.org
Microservices are being used more and more in the development of cloud-based
applications. Using containers, microservice instances can be made to be easier to scale …

[PDF][PDF] Machine Learning Security Defense Algorithms Based on Metadata Correlation Features.

R Jia, J Zhang, Y Lin - Computers, Materials & Continua, 2024 - cdn.techscience.cn
With the popularization of the Internet and the development of technology, cyber threats are
increasing day by day. Threats such as malware, hacking, and data breaches have had a …

Current Perspectives and Virtualisation solutions with SDN for IoT

S Bhardwaj, S Kumar, A Girdhar - 2023 Second International …, 2023 - ieeexplore.ieee.org
During the past years, IoT has acquired a lot of consideration since it incorporates intelligent
gadgets which empower many applications that work in our day-to-day existence. Due to …

Detection and mitigation of link flooding-based DDoS attacks on a software defined network using network function virtualisation

S Murtuza, K Asawa - International Journal of …, 2024 - inderscienceonline.com
Software defined networks (SDNs) are emerging as the first choice for network
administrators due to their agility, modularity and dynamism. Network operators can change …

Federated Transfer Component Analysis Towards Effective VNF Profiling

X ZhangB, S Moazzeni, JM Parra-Ullauri… - arXiv preprint arXiv …, 2024 - arxiv.org
The increasing concerns of knowledge transfer and data privacy challenge the traditional
gather-and-analyse paradigm in networks. Specifically, the intelligent orchestration of Virtual …