Currently, the use of cloud firewalls allows protecting not only individual network resources, but also the entire infrastructure of large data centers. The main requirement for a cloud …
Анотація Монографія присвячена питанням, пов'язаним із синтезом математичних моделей і методів маршрутизації, які б слугували подальшою теоретичною основою …
This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for …
A solution to the problem of ensuring quality of service, providing a greater number of services with higher efficiency taking into account network security is proposed. In this …
T Vitalii, B Anna, H Kateryna… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
International business groups are increasingly using terminal systems as workstations. At the same time, virtual machine servers are often located in the head structure, while remote …
Today, Ukraine is actively working on solving the problems of convergence of networks of various technologies, ensuring their compatibility in management, signaling and data traffic …
Анотація An approach to the calculation of secure paths based on the routing model taking into account information security risks using the basic vulnerability criticality metrics is …
The work is devoted to the design and research of the mathematical model for Secure Traffic Engineering Fast ReRoute under Traffic Policing (Secure TE-FRR-TP) approach. The task of …
Анотація Монографія присвячена розв'язанню задач, пов'язаних із розробленням математичних моделей для оптимізації процесів безпечної та відмовостійкої …