Novel Algorithms and Protocols for Networks

D Careglio, M Klinkowski, F Palmieri - Applied Sciences, 2021 - mdpi.com
Today, applications can be instantiated in a number of data centers located in different
segments of the network, from the core to the edge. Users accessing these applications …

Computer network technical protection system in civil aviation enterprises

K Dzhelalov - 2023 - dspace.nau.edu.ua
Today's world is defined by the rapid development of technologies that change the way we
live, work and interact. In this modern digital landscape, computer networks are becoming a …

NEW STRATEGIES FOR IMPROVING NETWORK SECURITY AGAINST CYBER ATTACK BASED ON INTELLIGENT ALGORITHMS

MZ Abdullah, AK Jassim… - Journal of …, 2024 - jeasd.uomustansiriyah.edu.iq
Gradually, since the number of linked computer systems that use networks linked to the
Internet is raised the information that is delivered through those systems becomes more …

[PDF][PDF] A Framework for Network Vulnerability Analysis.

G Qu, J Rudraraju, R Modukuri, S Hariri… - Communications …, 2002 - researchgate.net
With increasing faults and attacks on the Internet infrastructure, there is an urgent need to
develop techniques to analyze network and service vulnerability under organized fault …

Reconciliation engine and metric for network vulnerability assessment

HV Nath, K Gangadharan… - Proceedings of the First …, 2012 - dl.acm.org
Vulnerability reconciliation is the process that analyses the output produced by one or more
vulnerability scanners and provides a more succinct and high-level view of vulnerabilities …

A Survey: Network Attack Detection and Mitigation Techniques

O Shinde, V Kulkarni, H Patani, A Rajput… - … Conference on Smart …, 2024 - Springer
Network attack detection and mitigation systems (NADMS) is developed as defending
software to detect malicious cyber-attacks, safeguard critical infrastructure, and protect …

Analysis of Factors Affecting Network Security and Countermeasures Based on Network Attack Roadmap

G Dong - 2022 International Conference on Industrial IoT, Big …, 2022 - ieeexplore.ieee.org
In the information age, network technology has been applied to people's travel, consumption
activities, social activities and other fields. Network technology and information technology …

Protocol architecture and algorithms for distributed data center networks

P Raad - 2015 - theses.hal.science
While many business and personal applications are being pushed to the cloud, offering a
reliable and a stable network connectivity to cloud-hosted services becomes an important …

On the contemporary cybersecurity threats

LG Nikolov - Security & Future, 2017 - stumejournals.com
Cybersecurity is one of the most commented areas in IT nowadays. Plenty of network and
application attacks are possessed worldwide. Security becomes serious issue for …

CVSS metric-based analysis, classification and assessment of computer network threats and vulnerabilities

VR Kebande, I Kigwana, HS Venter… - … on Advances in Big …, 2018 - ieeexplore.ieee.org
This paper provides a Common Vulnerability Scoring System (CVSS) metric-based
technique for classifying and analysing the prevailing Computer Network Security …