|
|
|
João P. Ferreira, Vinicius C. Ferreira, Sérgio L. Nogueira, João M. Faria and José A. Afonso
The sharing of mobile network infrastructure has become a key topic with the introduction of 5G due to the high costs of deploying such infrastructures, with neutral host models coupled with features such as network function virtualization (NFV) and netw...
ver más
|
|
|
|
|
|
|
Salman Ali AlQahtani
With the advent of 5G networks, the demand for improved mobile broadband, massive machine-type communication, and ultra-reliable, low-latency communication has surged, enabling a wide array of new applications. A key enabling technology in 5G networks is...
ver más
|
|
|
|
|
|
|
Jianyu Wang, Shuo Ma, Pengpeng Jiao, Lanxin Ji, Xu Sun and Huapu Lu
This study explores risk factors influencing the at-fault party in traffic accidents and analyzes their impact on traffic accident severity. Based on the traffic accident data of Shenyang City, Liaoning Province, China, from 2018 to 2020, 19 attribute va...
ver más
|
|
|
|
|
|
|
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,...
ver más
|
|
|
|
|
|
|
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo and Giuseppe Pirlo
The 0-day attack is a cyber-attack based on vulnerabilities that have not yet been published. The detection of anomalous traffic generated by such attacks is vital, as it can represent a critical problem, both in a technical and economic sense, for a sma...
ver más
|
|
|
|
|
|
|
Adriana GRIGORESCU,Andreea MOCANU (NICOLAE)
Pág. 383
The crisis caused by COVID-19, made us rethink our perception of the way of life. Traffic restrictions, isolation, quarantine, the need for social distance have generated new behavior by transferring null activities in the online environment. The advanta...
ver más
|
|
|
|
|
|
|
Asmaa Abdallah, M. Zulfiker Ali, Jelena Mi?ic and Vojislav B. Mi?ic
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas. Then, the reliability of UAV connections and the a...
ver más
|
|
|
|
|
|
|
Håkon Gunleifsen, Vasileios Gkioulos and Thomas Kemmerich
This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted li...
ver más
|
|
|
|
|
|
|
V. N. Pakhomov?
Pág. 103 - 110
Purpose. Search for new options of the transition from Ethernet technology. Methodology. Physical structuring of the Fast Ethernet network based on hubs and logical structuring of Fast Ethernet network using commutators. Organization of VLAN based on por...
ver más
|
|
|
|
|
|
|
V. I. S?heka,I. O. Romancev,E. I. Jas?huk
Pág. 24 - 28
Introduction: With the introduction of high-speed traffic there is an increased consumption of traction current by new types of rolling stock. This issue is important, as high levels of traction currents can have not only prevents, but also a dangerous i...
ver más
|
|
|
|