[HTML][HTML] A smart energy IoT model based on the Itsuku PoW technology

J Li, Y Chen, YL Chen, W Zhang, Z Liu - Results in Engineering, 2023 - Elsevier
Based on the blockchain+ software defined network (SDN) technology, we explore and
research a new smart energy networks IoT architecture model of distributed trust to solve the …

Service level agreements for communication networks: A survey

A Akbari-Moghanjoughi, JRDA Amazonas… - arXiv preprint arXiv …, 2023 - arxiv.org
Information and Communication Technology (ICT) is being provided to the variety of end-
users demands, thereby providing a better and improved management of services is crucial …

Synthesis of models for networks using automated boolean learning

D Sethi, C Nagarajan - US Patent 10,826,770, 2020 - Google Patents
Abstract Systems, methods, and computer-readable media for determining a deployment
model for deploying rules in a network environment in response to deployment of a contract …

Intent-based control and management framework for optical transport networks supporting B5G services empowered by large language models

A Tzanakaki, M Anastasopoulos… - Journal of Optical …, 2024 - ieeexplore.ieee.org
This study focuses on the development of an intent-based networking (IBN) control and
management framework automating operations of beyond 5G (B5G) infrastructures …

Araucaria: Simplifying INC Fault Tolerance with High-Level Intents

R Parizotto, I Haque, A Schaeffer-Filho - arXiv preprint arXiv:2404.11728, 2024 - arxiv.org
Network programmability allows modification of fine-grain data plane functionality. The
performance benefits of data plane programmability have motivated many researchers to …

[PDF][PDF] CYBER ESPIONAGE CONSEQUENCES AS A GROWING THREAT.

A CIVULI, S LUMA-OSMANI, E RUFATI… - Journal of Natural …, 2022 - researchgate.net
Cyber espionage is the new arena in the world of espionage. Cyber espionage, or cyber
spying, is a type of cyber-attack in which an unauthorized user attempts to access sensitive …

Design of a system to support certification management with an adaptive architecture

S Araya, O Pinto, G Costa, D Ruete… - 2021 16th Iberian …, 2021 - ieeexplore.ieee.org
A flexible, scalable, and extensible architecture can provide operational continuity. However,
traditional system development processes do not provide clear guidelines to meet these …

[PDF][PDF] 复杂网络环境下面向威胁监测的采集策略精化方法

李凤华, 李子孚, 李凌, 张铭, 耿魁… - Journal on …, 2019 - infocomm-journal.com
个性化采集策略是有效监测复杂网络环境面临的威胁的必要条件之一, 然而安全需求和威胁类型
差异等导致难以有效生成个性化的采集策略. 针对上述问题, 设计了面向威胁监测的采集策略 …

NORA: An approach for transforming network management policies into automated planning problems

A Rodriguez-Vivas, OM Caicedo, A Ordoñez, JC Nobre… - Sensors, 2021 - mdpi.com
Realizing autonomic management control loops is pivotal for achieving self-driving
networks. Some studies have recently evidence the feasibility of using Automated Planning …

[HTML][HTML] Sistema para ejecutar políticas sobre infraestructuras de Tecnologías de la Información

M Peña Casanova, C Anías Calderón - Ingeniare. Revista chilena de …, 2019 - SciELO Chile
Una vía eficaz para lograr el alineamiento entre las infraestructuras de las tecnologías de la
información y los objetivos de la organización es la ejecución de políticas, que se definen al …