|
|
|
Bing Su and Jiwu Liang
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec...
ver más
|
|
|
|
|
|
|
Zengyu Cai, Chunchen Tan, Jianwei Zhang, Liang Zhu and Yuan Feng
As network technology continues to develop, the popularity of various intelligent terminals has accelerated, leading to a rapid growth in the scale of wireless network traffic. This growth has resulted in significant pressure on resource consumption and ...
ver más
|
|
|
|
|
|
|
Ruslans Babajans, Darja Cirjulina, Filips Capligins, Deniss Kolosovs and Anna Litvinenko
The current work is focused on studying the performance of the Pecora?Carroll synchronization technique to achieve synchronization between the analog and discrete chaos oscillators. The importance of this study is supported by the growing applications of...
ver más
|
|
|
|
|
|
|
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi...
ver más
|
|
|
|
|
|
|
Ola N. Halawi, Faisal N. Abu-Khzam and Sergio Thoumi
Enormous amounts of data collected from social networks or other online platforms are being published for the sake of statistics, marketing, and research, among other objectives. The consequent privacy and data security concerns have motivated the work o...
ver más
|
|
|
|
|
|
|
Xiao Huang, Xiaofeng Wang, Yuan Liu and Qingsong Xue
Traffic replay can effectively improve the fidelity of network emulation and can support emerging network verification and network security evaluation. A distributed traffic replay framework for network emulation, named DTRF, is designed for large-scale ...
ver más
|
|
|
|
|
|
|
Gerardo Hernández-Oregón, Mario E. Rivero-Angeles, Juan C. Chimal-Eguía and Jorge E. Coyac-Torres
Peer-to-Peer (P2P) networks have emerged as potential solutions to issues that cause inefficient download times in networks because they can use the resources in the entire network, allowing nodes to act both as servers and clients simultaneously. Common...
ver más
|
|
|
|
|
|
|
Messaoud Benguenane, Ahmed Korichi, Bouziane Brik and Nadjet Azzaoui
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of...
ver más
|
|
|
|
|
|
|
Yi Zhang, Lanxin Qiu, Yangzhou Xu, Xinjia Wang, Shengjie Wang, Agyemang Paul and Zhefu Wu
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial of Service (DDoS) attacks due to centralized control and flow-table constraints in network devices. To overcome this limitation, we introduce a multi-path routing alg...
ver más
|
|
|
|
|
|
|
Jianjun Wu, Yuxue Hu, Zhongqiang Huang, Junsong Li, Xiang Li and Ying Sha
Link prediction is a critical prerequisite and foundation task for social network security that involves predicting the potential relationship between nodes within a network or graph. Although the existing methods show promising performance, they often i...
ver más
|
|
|
|