Security threats to critical infrastructure: the human factor

I Ghafir, J Saleem, M Hammoudeh, H Faour… - The Journal of …, 2018 - Springer
In the twenty-first century, globalisation made corporate boundaries invisible and difficult to
manage. This new macroeconomic transformation caused by globalisation introduced new …

Computer Networking: Principles, Protocols and Practice

O Bonaventure - 2011 - dlib.hust.edu.vn
ment. Today, there are high-quality and widely used open-source implementations for most
networking protocols. This includes the TCP/IP implementations that are part of linux …

Design and implementation of client-server based application using socket programming in a distributed computing environment

RLR Maata, R Cordova, B Sudramurthy… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
This research study discusses the detail overview in developing a client server based
application using socket programming in a distributed computing environment. The …

A smart meeting room scheduling and management system with utilization control and ad-hoc support based on real-time occupancy detection

LD Tran, A Stojcevski, TC Pham… - 2016 IEEE Sixth …, 2016 - ieeexplore.ieee.org
In most meeting room scheduling or management system, the availability of meeting rooms
are mainly based on pre-determined schedules. However, since the meeting duration is not …

[图书][B] TCP/IP sockets in C#: practical guide for programmers

D Makofske, MJ Donahoo, KL Calvert - 2004 - books.google.com
" TCP/IP sockets in C# is an excellent book for anyone interested in writing network
applications using Microsoft. Net frameworks. It is a unique combination of well written …

Peachy parallel assignments (EduPar 2023)

A Lazar, V Niculescu, DP Bunde - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The presentation of Peachy Parallel Assignments at parallel and distributed computing
education workshops is an effort to promote the reuse of high-quality assignments, both …

Programming overlay networks with overlay sockets

J Liebeherr, J Wang, G Zhang - International Workshop on Networked …, 2003 - Springer
The emergence of application-layer overlay networks has inspired the development of new
network services and applications. Research on overlay networks has focused on the …

Accelerating netty-based applications through transparent InfiniBand support

F Ruhland, F Krakowski, M Schöttner - arXiv preprint arXiv:2209.14048, 2022 - arxiv.org
Many big-data frameworks are written in Java, eg Apache Spark, Flink and Cassandra.
These systems use the networking framework netty which is based on Java NIO. While this …

A Comprehensive Cryptocurrency approach based on a customized peer-to-peer network

N Allassak, S Trichni, F Omary - … of the 7th International Conference on …, 2024 - dl.acm.org
Creating a blockchain, particularly a cryptocurrency, is a complex task that demands a
profound understanding of the technical, economic, legal, and social challenges it faces. In …

[PDF][PDF] Leveraging VOIP on Local Area Network using Java Media Framework

G Asante, JB Hayfron-Acquah… - International Journal of …, 2015 - academia.edu
ABSTRACT Voice over Internet Protocol (VoIP) is a standard for taking analogue audio
signals, and turning them into digital data that can be transmitted over a network. VoIP has …