Publications of Ugo Fiore
|
|
- Norman O’Neal’
- 8 years ago
- Views:
Transcription
1 Publications of Ugo Fiore Journal papers [J31] A. Castiglione, R. De Prisco, A. De Santis, U. Fiore, and F. Palmieri. A botnet-based command and control approach relying on swarm intelligence. In: Journal of Network and Computer Applications 38.0 (2014), pp issn: [J30] A. Castiglione, L. Catuogno, A. Del Sorbo, U. Fiore, and F. Palmieri. A secure file sharing service for distributed computing environments. In: Journal of Supercomputing 67.3 (2014), pp issn: [J29] [J28] [J27] [J26] [J25] [J24] A. Castiglione, F. Palmieri, U. Fiore, A. Castiglione, and A. De Santis. Modeling energy-efficient secure communications in multi-mode wireless mobile devices. In: Journal of Computer and System Sciences (2014). Article in Press, pp.. U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis. A Cluster- Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems. In: International Journal of Parallel Programming 42.5 (2014), pp issn: F. Palmieri, U. Fiore, and A. Castiglione. A distributed approach to network anomaly detection based on independent component analysis. In: Concurrency and Computation: Practice and Experience 26.5 (2014), pp issn: F. Palmieri, U. F. ans Sergio Ricciardi, and Aniello. GRASP-based resource re-optimization for effective big data access in federated clouds. In: Future Generation Computer Systems (2014). Article in Press, pp.. F. Palmieri, S. Ricciardi, U. Fiore, M. Ficco, and A. Castiglione. Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. In: The Journal of Supercomputing (2014). Article in Press, pp.. issn: G. Wu, Z. Du, Y. Hu, T. Jung, U. Fiore, and K. Yim. A dynamic trust model exploiting the time slice in WSNs. In: Soft Computing 18.9 (2014), pp issn:
2 [J23] [J22] [J21] [J20] A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. On the Detection of Card-Sharing Traffic through Wavelet Analysis and Support Vector Machines. In: Applied Soft Computing 13.1 (2013), pp issn: A. De Santis, A. Castiglione, U. Fiore, and F. Palmieri. An intelligent security architecture for distributed firewalling environments. In: Journal of Ambient Intelligence and Humanized Computing 4.2 (2013), pp issn: U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis. Network anomaly detection with the restricted Boltzmann machine. In: Neurocomputing 122 (2013), pp issn: S. Ricciardi, F. Palmieri, U. Fiore, A. Castiglione, and G. Santos-Boada. Modeling energy consumption in next-generation wireless access-over- WDM networks with hybrid power sources. In: Mathematical and Computer Modelling (2013), pp issn: [J19] S. Ricciardi, D. Careglio, F. Palmieri, U. Fiore, G. Santos-Boada, and J. Solé-Pareta. Towards an energy-aware Internet: modeling a cross-layer optimization approach. In: Telecommunication Systems 52.2 (2013), pp issn: [J18] [J17] [J16] [J15] [J14] [J13] A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. An asynchronous covert channel using spam. In: Computers & Mathematics with Applications 63.2 (2012). Advances in context, cognitive, and secure computing, pp issn: doi: /j.camwa F. Palmieri, U. Fiore, and S. Ricciardi. Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks. In: Computer Communications 35.3 (2012), pp issn: doi: /j.comcom S. Ricciardi, F. Palmieri, U. Fiore, D. Careglio, G. Santos-Boada, and J. Solé-Pareta. An Energy-Aware Dynamic RWA Framework for Next-Generation Wavelength-Routed Networks. In: Computer Networks (2012), pp issn: A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. Automatic security assessment for next generation wireless mobile networks. In: Mobile Information Systems 7.3 (2011), pp issn: x. U. Fiore. Selective Redundancy Removal: A Framework for Data Hiding. In: Future Internet 2.1 (2010), pp issn: F. Palmieri and U. Fiore. Network anomaly detection through nonlinear analysis. In: Computers & Security 29.7 (2010), pp issn:
3 [J12] [J11] [J10] [J9] [J8] [J7] [J6] [J5] [J4] [J3] [J2] [J1] F. Palmieri, U. Fiore, and S. Ricciardi. A GRASP-based network reoptimization strategy for improving RWA in multi-constrained optical transport infrastructures. In: Computer Communications (2010), pp issn: F. Palmieri, U. Fiore, and S. Ricciardi. Constrained minimum lightpath affinity routing in multi-layer optical transport networks. In: Journal of High Speed Networks 17.4 (2010), pp issn: F. Palmieri and U. Fiore. A nonlinear, recurrence-based approach to traffic classification. In: Computer Networks 53.6 (2009), pp issn: F. Palmieri and U. Fiore. Providing true end-to-end security in converged voice over IP infrastructures. In: Computers & Security 28.6 (2009), pp issn: F. Palmieri and U. Fiore. Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies. In: Computers & Security (2008), pp issn: F. Palmieri, U. Fiore, and S. Ricciardi. A minimum cut interferencebased integrated RWA algorithm for multi-constrained optical transport networks. In: Journal of Network and Systems Management 16.4 (2008), pp issn: F. Palmieri and U. Fiore. Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system. In: International Journal of Wireless and Mobile Computing 2.1 (2007), pp issn: F. Palmieri and U. Fiore. Enhanced security strategies for MPLS signaling. In: Journal of Networks 2.5 (2007), pp issn: F. Palmieri, U. Fiore, and S. Ricciardi. SPARK: a smart parametric online RWA algorithm. In: Journal of Communications and Networks 9.4 (2007), pp issn: F. Palmieri and U. Fiore. An evolutionary genetic-based approach for traffic engineering in GMPLS networks. In: WSEAS Transactions on Communications 4.12 (2005), pp issn: F. Palmieri and U. Fiore. Implementing Effective Optical Multicast with Minimum Interference Constrained Routing and Wavelength Assignment. In: WSEAS Transactions on Communications 7.4 (2005), pp issn: F. Palmieri and U. Fiore. Recurrence Plot Analysis of Internet Traffic. In: WSEAS Transactions on Systems 4.2 (2003), pp issn:
4 Book chapters [B4] S. Ricciardi, F. Palmieri, U. Fiore, D. Careglio, G. Santos-Boada, and J. Solé-Pareta. Towards Energy-Oriented Telecommunication Networks. In: Handbook of Green Information and Communication Systems. Academic Press, 2013, pp isbn: [B3] [B2] [B1] F. Palmieri and U. Fiore. An agent-based network-aware approach to grid resource scheduling. In: Wireless Networks: Research, Technology and Applications. 2009, pp F. Palmieri and U. Fiore. Dynamic network optimization for effective QoS support in large grid infrastructures. In: Quantitative Quality of Service for Grid Computing: Applications for Heterogeneity, Large-Scale Distribution, and Dynamic Environments. 2009, pp F. Palmieri and U. Fiore. Exploring regularities and self-similarity in Internet traffic. In: Recent Advances in Simulation, Computational Methods and Soft Computing. WSEAS Press, 2002, pp isbn: Conference papers [C24] [C23] [C22] U. Fiore, A. Castiglione, A. De Santis, and F. Palmieri. Countering browser fingerprinting techniques: Constructing a fake profile with Google Chrome. In: 2014 International Conference on Network-Based Information Systems (NBiS 2014). IEEE, 2014, pp U. Fiore, F. Palmieri, A. Castiglione, V. Loia, and A. De Santis. Multimedia-based battery drain attacks for Android devices. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC 2014). IEEE, 2014, pp doi: / CCNC A. Armando, A. Castiglione, G. Costa, U. Fiore, A. Merlo, L. Verderame, and I. You. Trustworthy Opportunistic Access to the Internet of Services. In: Proceedings Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, Vol Lecture Notes in Computer Science. Springer, 2013, pp doi: / _52. [C21] G. Carullo, A. Castiglione, G. Cattaneo, A. De Santis, U. Fiore, and F. Palmieri. FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA). 2013, pp doi: /AINA
5 [C20] [C19] [C18] [C17] A. Castiglione, A. De Santis, A. Castiglione, F. Palmieri, and U. Fiore. An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications. In: Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), Xi an, China, September 9-11, IEEE, 2013, pp doi: /INCoS F. Palmieri, U. Fiore, A. Castiglione, F.-Y. Leu, and A. De Santis. Analyzing the Internet Stability in Presence of Disasters. In: Security Engineering and Intelligence Informatics. Ed. by A. Cuzzocrea, C. Kittl, D. Simos, E. Weippl, and L. Xu. Vol Lecture Notes in Computer Science. Springer, 2013, pp doi: / _18. S. Ricciardi, G. Santos-Boada, D. Careglio, F. Palmieri, and U. Fiore. Evaluating energy savings in WoL-enabled networks of PCs. In: 2013 IEEE International Symposium on Industrial Electronics (ISIE). 2013, pp doi: /ISIE A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. Device Tracking in Private Networks via NAPT Log Analysis. In: 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, Palermo, Italy, July 4-6, IEEE, 2012, pp isbn: doi: /IMIS [C16] S. Ricciardi, D. Careglio, F. Palmieri, U. Fiore, G. Santos-Boada, and J. Solé-Pareta. Energy-oriented models for WDM networks. In: Broadband Communications, Networks, and Systems. Vol. 66. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012, pp [C15] [C14] A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. -Based Covert Channels for Asynchronous Message Steganography. In: Proceedings of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2011). IEEE, 2011, pp F. Palmieri, S. Ricciardi, and U. Fiore. Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Arena. In: Proceedings of the 2011 International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011). IEEE, 2011, pp doi: /BWCCA [C13] S. Ricciardi, D. Careglio, F. Palmieri, U. Fiore, G. Santos-Boada, and J. Solé-Pareta. Analyzing local strategies for energy efficient networking. In: Proceedings of 1st Workshop on Sustainable Networking (SUNSET 2011). Vol Lecture Notes in Computer Science. Springer, 2011, pp isbn:
6 [C12] S. Ricciardi, D. Careglio, F. Palmieri, U. Fiore, G. Santos-Boada, and J. Solé-Pareta. Energy-aware RWA for WDM networks with dual power sources. In: Proceedings of the 2011 IEEE International Conference on Communications (ICC 2011). 2011, pp doi: /icc [C11] [C10] [C9] [C8] [C7] [C6] [C5] [C4] [C3] [C2] S. Ricciardi, D. Careglio, G. Santos-Boada, J. Solé-Pareta, U. Fiore, and F. Palmieri. Saving Energy in Data Center Infrastructures. In: Proceedings of the 1st International Conference on Data Compression, Communication and Processing (CCP 2011). 2011, pp A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats. In: Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010). IEEE, 2010, pp F. Palmieri and U. Fiore. Insights into peer to peer traffic through nonlinear analysis. In: Proceedings of the 15th IEEE symposium on Computers and Communications (ISCC 2010). IEEE, 2010, pp F. Palmieri, U. Fiore, and S. Ricciardi. SimulNet: a wavelength-routed optical network simulation framework. In: Proceedings of the 2009 IEEE Symposium on Computers and Communications (ISCC 2009). IEEE, 2009, pp F. Palmieri and U. Fiore. A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks. In: vol Lecture Notes in Computer Science. Springer, 2006, pp F. Palmieri and U. Fiore. Audit-Based Access Control in Nomadic Wireless Environments. In: vol Lecture Notes in Computer Science. Springer, 2006, pp F. Palmieri and U. Fiore. Genetic-based Traffic Engineering in GMPLS networks. In: Proceedings of the 5th WSEAS International Conference on Simulation, Modeling and Optimization, Corfu, Greece. 2005, pp.. F. Palmieri and U. Fiore. Introducing public gateways: An effective hardening strategy against spam. In: vol Lecture Notes in Computer Science. Springer, 2005, pp F. Palmieri and U. Fiore. Minimum interference optical multicast. In: Proceedings of the 9th WSEAS International Conference on Computers. WSEAS, 2005, pp isbn: F. Palmieri and U. Fiore. Securing the MPLS control plane. In: vol Lecture Notes in Computer Science. Springer, 2005, pp
7 [C1] F. Palmieri and U. Fiore. Introducing MPLS in mobile data networks: An high performance framework for QoS-powered IP mobility. In: vol Lecture Notes in Computer Science. Springer, 2003, pp
Energy Efficient Cloud Computing: Challenges and Solutions
Energy Efficient Cloud Computing: Challenges and Solutions Burak Kantarci and Hussein T. Mouftah School of Electrical Engineering and Computer Science University of Ottawa Ottawa, ON, Canada 08 September
More informationContents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
More informationThe Internet of the future: What could it be and what are the challenges
The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and
More informationCross-layer Optimisation and Traffic Control for Delivering Super High Definition Video
Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video Miguel Rio, John Mitchell, David Griffin, Eleni Mykoniati, Raul Landa, Richard Clegg Department of Electronic and
More informationReaping the Full Benefits of a Hybrid Network
Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage
More informationMOTIVE (MObile Terminal Information Value added functionality) Project: IST-027659-STP. 6th Concertation Meeting of IST-FP6 Brussels, 21/03/2006
(MObile Information Value added functionality) Project: IST-027659-STP 6th Concertation Meeting of IST-FP6 Brussels, 21/03/2006 Presentation Overview Project presentation Scope - Objectives Innovation
More informationEvolving Optical Transport Network Security
Evolving Optical Transport Network Security May 15, 2012 Prepared by: John Kimmins Executive Director 732-699-6188 jkimmins@appcomsci.com Copyright 2012 All Rights reserved 1 Outline Overview of Optical
More informationSecurity issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
More informationIntelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
More informationHuawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
More informationDesign of Electronic Medical Record System Based on Cloud Computing Technology
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based
More informationA Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between
More informationIntroduction to Computer Networking: Trends and Issues
Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Indo-US Collaboration in Engineering Education (IUCEE) Webinar,
More informationLow-Carbon Routing Algorithms For Cloud Computing Services in IP-over-WDM Networks
IEEE ICC 2012 - Optical Networks and Systems Low-Carbon Routing Algorithms For Cloud Computing Services in IP-over-WDM Networks Mirko Gattulli, Massimo Tornatore, Riccardo Fiandra, Achille Pattavina Department
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationInternational Open Workshop on Optical Communications Systems and Networks
International Open Workshop on Optical Communications Systems and Networks Multilayer Traffic Monitoring for efficient network planning, operating and troubleshooting Josep Solé-Pareta pareta@ac.upc.edu
More informationDr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6
Dr Christos Anagnostopoulos 1. Education Ph.D. in Computer Science Department of Informatics & Telecommunications, National and Kapodistrian University of Athens, July 2008 Dissertation: Pervasive and
More informationPERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
More informationHuawei Agile WAN Solution
Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service
More informationWDM Passive Optical Networks: Protection and Restoration
OECC 2009 Workshop: Next-generation Broadband Optical Access Future Challenges Session 1: Broadband Network Architectures, WDM PON Evolution Strategies and Future Ultra-high- bandwidth Services WDM Passive
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More informationTHE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
More informationAchieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
More informationA Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
More informationHow To Make A Cell Phone Converged Into A Cell Network
MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationA Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
More informationHigh Performance Computing for Wireless Telecom Research
High Performance Computing for Wireless Telecom Research Maziar Nekovee BT Research & University College London maziar.nekovee@bt.com T. Hewer, R. Saksena, P. V. Coveney (UCL) Keith Briggs, S. Kawade,
More informationPRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS
PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS www.massif-project.eu Dr Andrew Hutchison T-Systems (andrew.hutchison@t-systems.com) MAanagement of Security information and events
More informationDETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES
IJITE Vol. 4 No.1-2 January-December 2013, pp.13-17 International Sciences Press DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES D. Lakshmana Kumar 1 and G. Draksha 2 1 M.Tech. Student, Department
More informationDIADEM Firewall (Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D)
(Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D) Fact sheet 7 partners from 6 countries 4 academic partners: University of Tübingen (germany),
More informationCall for Papers for Next-Generation Networking and Internet Symposium
Call for Papers for Next-Generation Networking and Internet Symposium Scope and Motivation: The focus of the Next-Generation Networking Symposium includes emerging topics in the broad area of networking,
More informationA Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service
A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service P. Calduwel Newton 1 and L. Arockiam 2 1 Assistant Professor in Computer Science, Bishop Heber College
More informationNETWORK TO NETWORK INTERFACE PLAN
AT&T will provide interconnect points at both the Network Security Operations Center (NSOC) and the Sam Houston Building (SHB), the prescribed DIR locations via AT&T s VPN (AVPN) service. The standards-based
More informationUK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008
UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More informationOptical Networking for Data Centres Network
Optical Networking for Data Centres Network Salvatore Spadaro Advanced Broadband Communications Centre () Universitat Politècnica de Catalunya (UPC) Barcelona, Spain spadaro@tsc.upc.edu Workshop on Design
More informationHow To Find A Vpn Wan Solution
Sorting Out the Alphabet Soup of VPN Solutions A practical approach to assessing WAN technologies that support your distributed organization s diverse needs Get Started Now: 877.611.6342 to learn more.
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationAn Architecture for the Self-management of Lambda-Connections in Hybrid Networks
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,
More informationOptimal Mixtures of Different Types of Recovery Schemes in Optical Networks
Optimal Mixtures of Different Types of Recovery Schemes in Optical Networks David Griffith, Kotikalapudi Sriram, Stephan Klink, and Nada Golmie National Institute of Standards and Technology (NIST) Bureau
More informationHow To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
More informationThe 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
More informationB.Sc. degree in Computer Science, with honors, 1986 Technion, Israel Institute of Technology (IIT), Haifa, Israel
Education: D.Sc. degree in Computer Science,1994 Research subject: Protocols for Spatial and Slot Reuse in Bus Networks Research: Distributed algorithms, MAC protocols for wired and wireless networks.
More informationSolution Brief. Secure and Assured Networking for Financial Services
Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationHow to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
More informationCyber Security Through Visualization
Cyber Security Through Visualization Kwan-Liu Ma Department of Computer Science University of California at Davis Email: ma@cs.ucdavis.edu Networked computers are subject to attack, misuse, and abuse.
More informationImplementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
More informationCOSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
More informationAlessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014
Alessia Garofalo Ph.D. Student in Information Engineering University of Naples «Parthenope» Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks Fai della Paganella, 10-12/02/2014
More informationApplications' of Cloud Computing in Academic Institutions
Applications' of Cloud Computing in Academic Institutions Muhammad Mannir Ahmad Getso University of East London Kuala Lumpur Malaysia manniru@gmail.com Riyaz Ahmed A. H. School of Engineering & Computing
More informationContents. Biography. Acknowledgments. List of Abbreviations. List of Symbols
Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation
More informationDESIGN OF INTELLIGENT DEVICE TO SAVE STANDBY POWER IN NETWORK ENABLED DEVICES
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 216, pp. 54-61, Article ID: IJCET_7_1_7 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
More informationConverged Private Networks. Supporting voice and business-critical applications across multiple sites
Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice
More informationSelf-organized Multi-agent System for Service Management in the Next Generation Networks
PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek
More informationCEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
More informationCloud Computing and Software Agents: Towards Cloud Intelligent Services
Cloud Computing and Software Agents: Towards Cloud Intelligent Services Domenico Talia ICAR-CNR & University of Calabria Rende, Italy talia@deis.unical.it Abstract Cloud computing systems provide large-scale
More informationMaster of Science (Electrical Engineering) MS(EE)
Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant
More informationUniversity of Nicosia, Cyprus
University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-513 Computer Networks and 10 Web Technologies Department Semester Prerequisites Computer Science Spring None Type of Course Field
More informationArticles IEEE have removed from their database
Articles IEEE have removed from their database Application of Game-Theoretic and Virtual Algorithms in Information Retrieval System 2008 International Conference on MultiMedia and Information Technology
More informationCloud Security - Risiken und Chancen
Dr. Matthias Schunter, MBA IBM Research Zürich, mts@zurich.ibm.com, http://www.schunter.org Simple Questions Today s Data Center Tomorrow s Public Cloud We Have Control It s located at X. It s stored in
More informationPART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
More informationSecuring the Mobile Enterprise with Network-Based Security and Cloud Computing
Securing the Mobile Enterprise with Network-Based Security and Cloud Computing Gustavo de los Reyes, Sanjay Macwan, Deepak Chawla, Cristina Serban AT&T Security Research Center {gdelosreyes, sjm, dchawla,
More informationNetworking Research: Trends and Issues
1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of
More informationBasheer Al-Duwairi Jordan University of Science & Technology
Basheer Al-Duwairi Jordan University of Science & Technology Assistant Professor Department of Network Engineering & Security @ JUST Education: PhD, Iowa State University, 2005 Ms, Iowa State University,
More informationLoad-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks
Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir
More informationBio-inspired mechanisms for efficient and adaptive network security
Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany dressler@informatik.uni-erlangen.de
More informationEthical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
More informationHow To Protect Your Mobile From Attack From A Signalling Storm
ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem
More informationReal-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass
Real-time Network Monitoring and Security Platform for Securing Next-Generation Network Assoc. Prof. Dr. Sureswaran Ramadass The platform Definition A description of a software framework that makes services
More informationMSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526
MSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526 1. Introduction The field of Information Technology has been a continuously expanding
More informationInternational Journal of Computer Sciences and Engineering Open Access. Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm Garima Malik
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationEfficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
More informationCONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
More information!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565
!! "# $%!& '(!)**+* $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565 1 Content CRUTIAL testbeds - objectives The Telecontrol Testbed platform Critical scenarios - plotted demo Experimental results The
More informationBroadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation
More informationSECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS
SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS Christian HÄGERLING Fabian M. KURTZ Christian WIETFELD TU Dortmund University Germany
More informationNetwork Security Using Hybrid Port Knocking
8 Network Security Using Hybrid Port Knocking Dr. Hussein Al-Bahadili and Dr. Ali H. Hadi, Arab Academy for Financial Sciences, faculty of Information Technology, Amman Jordan Arab Academy for Financial
More informationCloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
More informationKeywords: WMSN, MCC, NIST
Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cheating Proof
More informationOptical Networks for Next Generation Disaster Recovery Networking Solutions with WDM Systems Cloud Computing and Security
Optical Networks for Next Generation Disaster Recovery Networking Solutions with WDM Systems Cloud Computing and Security By Andrew MacKay, Chief Technology Officer, Superna www.superna.net Legacy Data
More informationInternet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges
More informationAn Emulation Study on PCE with Survivability: Protocol Extensions and Implementation
1 An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation Xiaomin Chen, Yuesheng Zhong, Admela Jukan Technische Universität Carolo-Wilhelmina zu Braunschweig Email: chen@ida.ing.tu-bs.de,y.zhong@tu-bs.de,
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationEnd-to-End Dedicated Protection in Multi-Segment Optical Networks
End-to-End Dedicated Protection in Multi-Segment Optical Networks Srinivasan Seetharaman, Admela Jukan and Mostafa Ammar Georgia Institute of Technology, Atlanta, GA Email: {srini, ajukan, ammar}@cc.gatech.edu
More informationSpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
More informationDesigning and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
More informationA Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
More informationFirewall and VPN Investigation on Cloud Computing Performance
Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation
More informationTitle ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval
Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval 0677 Q1 6,536 12 United States 2 Swarm and Evolutionary Computation 2210 6502 Q1 3,364 8 Netherlands 3 IEEE Transactions
More informationpacket retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
More information