Publications of Ugo Fiore

Size: px
Start display at page:

Download "Publications of Ugo Fiore"

Transcription

1 Publications of Ugo Fiore Journal papers [J31] A. Castiglione, R. De Prisco, A. De Santis, U. Fiore, and F. Palmieri. A botnet-based command and control approach relying on swarm intelligence. In: Journal of Network and Computer Applications 38.0 (2014), pp issn: [J30] A. Castiglione, L. Catuogno, A. Del Sorbo, U. Fiore, and F. Palmieri. A secure file sharing service for distributed computing environments. In: Journal of Supercomputing 67.3 (2014), pp issn: [J29] [J28] [J27] [J26] [J25] [J24] A. Castiglione, F. Palmieri, U. Fiore, A. Castiglione, and A. De Santis. Modeling energy-efficient secure communications in multi-mode wireless mobile devices. In: Journal of Computer and System Sciences (2014). Article in Press, pp.. U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis. A Cluster- Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems. In: International Journal of Parallel Programming 42.5 (2014), pp issn: F. Palmieri, U. Fiore, and A. Castiglione. A distributed approach to network anomaly detection based on independent component analysis. In: Concurrency and Computation: Practice and Experience 26.5 (2014), pp issn: F. Palmieri, U. F. ans Sergio Ricciardi, and Aniello. GRASP-based resource re-optimization for effective big data access in federated clouds. In: Future Generation Computer Systems (2014). Article in Press, pp.. F. Palmieri, S. Ricciardi, U. Fiore, M. Ficco, and A. Castiglione. Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. In: The Journal of Supercomputing (2014). Article in Press, pp.. issn: G. Wu, Z. Du, Y. Hu, T. Jung, U. Fiore, and K. Yim. A dynamic trust model exploiting the time slice in WSNs. In: Soft Computing 18.9 (2014), pp issn:

2 [J23] [J22] [J21] [J20] A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. On the Detection of Card-Sharing Traffic through Wavelet Analysis and Support Vector Machines. In: Applied Soft Computing 13.1 (2013), pp issn: A. De Santis, A. Castiglione, U. Fiore, and F. Palmieri. An intelligent security architecture for distributed firewalling environments. In: Journal of Ambient Intelligence and Humanized Computing 4.2 (2013), pp issn: U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis. Network anomaly detection with the restricted Boltzmann machine. In: Neurocomputing 122 (2013), pp issn: S. Ricciardi, F. Palmieri, U. Fiore, A. Castiglione, and G. Santos-Boada. Modeling energy consumption in next-generation wireless access-over- WDM networks with hybrid power sources. In: Mathematical and Computer Modelling (2013), pp issn: [J19] S. Ricciardi, D. Careglio, F. Palmieri, U. Fiore, G. Santos-Boada, and J. Solé-Pareta. Towards an energy-aware Internet: modeling a cross-layer optimization approach. In: Telecommunication Systems 52.2 (2013), pp issn: [J18] [J17] [J16] [J15] [J14] [J13] A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. An asynchronous covert channel using spam. In: Computers & Mathematics with Applications 63.2 (2012). Advances in context, cognitive, and secure computing, pp issn: doi: /j.camwa F. Palmieri, U. Fiore, and S. Ricciardi. Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks. In: Computer Communications 35.3 (2012), pp issn: doi: /j.comcom S. Ricciardi, F. Palmieri, U. Fiore, D. Careglio, G. Santos-Boada, and J. Solé-Pareta. An Energy-Aware Dynamic RWA Framework for Next-Generation Wavelength-Routed Networks. In: Computer Networks (2012), pp issn: A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. Automatic security assessment for next generation wireless mobile networks. In: Mobile Information Systems 7.3 (2011), pp issn: x. U. Fiore. Selective Redundancy Removal: A Framework for Data Hiding. In: Future Internet 2.1 (2010), pp issn: F. Palmieri and U. Fiore. Network anomaly detection through nonlinear analysis. In: Computers & Security 29.7 (2010), pp issn:

3 [J12] [J11] [J10] [J9] [J8] [J7] [J6] [J5] [J4] [J3] [J2] [J1] F. Palmieri, U. Fiore, and S. Ricciardi. A GRASP-based network reoptimization strategy for improving RWA in multi-constrained optical transport infrastructures. In: Computer Communications (2010), pp issn: F. Palmieri, U. Fiore, and S. Ricciardi. Constrained minimum lightpath affinity routing in multi-layer optical transport networks. In: Journal of High Speed Networks 17.4 (2010), pp issn: F. Palmieri and U. Fiore. A nonlinear, recurrence-based approach to traffic classification. In: Computer Networks 53.6 (2009), pp issn: F. Palmieri and U. Fiore. Providing true end-to-end security in converged voice over IP infrastructures. In: Computers & Security 28.6 (2009), pp issn: F. Palmieri and U. Fiore. Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies. In: Computers & Security (2008), pp issn: F. Palmieri, U. Fiore, and S. Ricciardi. A minimum cut interferencebased integrated RWA algorithm for multi-constrained optical transport networks. In: Journal of Network and Systems Management 16.4 (2008), pp issn: F. Palmieri and U. Fiore. Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system. In: International Journal of Wireless and Mobile Computing 2.1 (2007), pp issn: F. Palmieri and U. Fiore. Enhanced security strategies for MPLS signaling. In: Journal of Networks 2.5 (2007), pp issn: F. Palmieri, U. Fiore, and S. Ricciardi. SPARK: a smart parametric online RWA algorithm. In: Journal of Communications and Networks 9.4 (2007), pp issn: F. Palmieri and U. Fiore. An evolutionary genetic-based approach for traffic engineering in GMPLS networks. In: WSEAS Transactions on Communications 4.12 (2005), pp issn: F. Palmieri and U. Fiore. Implementing Effective Optical Multicast with Minimum Interference Constrained Routing and Wavelength Assignment. In: WSEAS Transactions on Communications 7.4 (2005), pp issn: F. Palmieri and U. Fiore. Recurrence Plot Analysis of Internet Traffic. In: WSEAS Transactions on Systems 4.2 (2003), pp issn:

4 Book chapters [B4] S. Ricciardi, F. Palmieri, U. Fiore, D. Careglio, G. Santos-Boada, and J. Solé-Pareta. Towards Energy-Oriented Telecommunication Networks. In: Handbook of Green Information and Communication Systems. Academic Press, 2013, pp isbn: [B3] [B2] [B1] F. Palmieri and U. Fiore. An agent-based network-aware approach to grid resource scheduling. In: Wireless Networks: Research, Technology and Applications. 2009, pp F. Palmieri and U. Fiore. Dynamic network optimization for effective QoS support in large grid infrastructures. In: Quantitative Quality of Service for Grid Computing: Applications for Heterogeneity, Large-Scale Distribution, and Dynamic Environments. 2009, pp F. Palmieri and U. Fiore. Exploring regularities and self-similarity in Internet traffic. In: Recent Advances in Simulation, Computational Methods and Soft Computing. WSEAS Press, 2002, pp isbn: Conference papers [C24] [C23] [C22] U. Fiore, A. Castiglione, A. De Santis, and F. Palmieri. Countering browser fingerprinting techniques: Constructing a fake profile with Google Chrome. In: 2014 International Conference on Network-Based Information Systems (NBiS 2014). IEEE, 2014, pp U. Fiore, F. Palmieri, A. Castiglione, V. Loia, and A. De Santis. Multimedia-based battery drain attacks for Android devices. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC 2014). IEEE, 2014, pp doi: / CCNC A. Armando, A. Castiglione, G. Costa, U. Fiore, A. Merlo, L. Verderame, and I. You. Trustworthy Opportunistic Access to the Internet of Services. In: Proceedings Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, Vol Lecture Notes in Computer Science. Springer, 2013, pp doi: / _52. [C21] G. Carullo, A. Castiglione, G. Cattaneo, A. De Santis, U. Fiore, and F. Palmieri. FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA). 2013, pp doi: /AINA

5 [C20] [C19] [C18] [C17] A. Castiglione, A. De Santis, A. Castiglione, F. Palmieri, and U. Fiore. An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications. In: Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), Xi an, China, September 9-11, IEEE, 2013, pp doi: /INCoS F. Palmieri, U. Fiore, A. Castiglione, F.-Y. Leu, and A. De Santis. Analyzing the Internet Stability in Presence of Disasters. In: Security Engineering and Intelligence Informatics. Ed. by A. Cuzzocrea, C. Kittl, D. Simos, E. Weippl, and L. Xu. Vol Lecture Notes in Computer Science. Springer, 2013, pp doi: / _18. S. Ricciardi, G. Santos-Boada, D. Careglio, F. Palmieri, and U. Fiore. Evaluating energy savings in WoL-enabled networks of PCs. In: 2013 IEEE International Symposium on Industrial Electronics (ISIE). 2013, pp doi: /ISIE A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. Device Tracking in Private Networks via NAPT Log Analysis. In: 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, Palermo, Italy, July 4-6, IEEE, 2012, pp isbn: doi: /IMIS [C16] S. Ricciardi, D. Careglio, F. Palmieri, U. Fiore, G. Santos-Boada, and J. Solé-Pareta. Energy-oriented models for WDM networks. In: Broadband Communications, Networks, and Systems. Vol. 66. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012, pp [C15] [C14] A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. -Based Covert Channels for Asynchronous Message Steganography. In: Proceedings of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2011). IEEE, 2011, pp F. Palmieri, S. Ricciardi, and U. Fiore. Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Arena. In: Proceedings of the 2011 International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011). IEEE, 2011, pp doi: /BWCCA [C13] S. Ricciardi, D. Careglio, F. Palmieri, U. Fiore, G. Santos-Boada, and J. Solé-Pareta. Analyzing local strategies for energy efficient networking. In: Proceedings of 1st Workshop on Sustainable Networking (SUNSET 2011). Vol Lecture Notes in Computer Science. Springer, 2011, pp isbn:

6 [C12] S. Ricciardi, D. Careglio, F. Palmieri, U. Fiore, G. Santos-Boada, and J. Solé-Pareta. Energy-aware RWA for WDM networks with dual power sources. In: Proceedings of the 2011 IEEE International Conference on Communications (ICC 2011). 2011, pp doi: /icc [C11] [C10] [C9] [C8] [C7] [C6] [C5] [C4] [C3] [C2] S. Ricciardi, D. Careglio, G. Santos-Boada, J. Solé-Pareta, U. Fiore, and F. Palmieri. Saving Energy in Data Center Infrastructures. In: Proceedings of the 1st International Conference on Data Compression, Communication and Processing (CCP 2011). 2011, pp A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri. An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats. In: Proceedings of the 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA 2010). IEEE, 2010, pp F. Palmieri and U. Fiore. Insights into peer to peer traffic through nonlinear analysis. In: Proceedings of the 15th IEEE symposium on Computers and Communications (ISCC 2010). IEEE, 2010, pp F. Palmieri, U. Fiore, and S. Ricciardi. SimulNet: a wavelength-routed optical network simulation framework. In: Proceedings of the 2009 IEEE Symposium on Computers and Communications (ISCC 2009). IEEE, 2009, pp F. Palmieri and U. Fiore. A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks. In: vol Lecture Notes in Computer Science. Springer, 2006, pp F. Palmieri and U. Fiore. Audit-Based Access Control in Nomadic Wireless Environments. In: vol Lecture Notes in Computer Science. Springer, 2006, pp F. Palmieri and U. Fiore. Genetic-based Traffic Engineering in GMPLS networks. In: Proceedings of the 5th WSEAS International Conference on Simulation, Modeling and Optimization, Corfu, Greece. 2005, pp.. F. Palmieri and U. Fiore. Introducing public gateways: An effective hardening strategy against spam. In: vol Lecture Notes in Computer Science. Springer, 2005, pp F. Palmieri and U. Fiore. Minimum interference optical multicast. In: Proceedings of the 9th WSEAS International Conference on Computers. WSEAS, 2005, pp isbn: F. Palmieri and U. Fiore. Securing the MPLS control plane. In: vol Lecture Notes in Computer Science. Springer, 2005, pp

7 [C1] F. Palmieri and U. Fiore. Introducing MPLS in mobile data networks: An high performance framework for QoS-powered IP mobility. In: vol Lecture Notes in Computer Science. Springer, 2003, pp

Energy Efficient Cloud Computing: Challenges and Solutions

Energy Efficient Cloud Computing: Challenges and Solutions Energy Efficient Cloud Computing: Challenges and Solutions Burak Kantarci and Hussein T. Mouftah School of Electrical Engineering and Computer Science University of Ottawa Ottawa, ON, Canada 08 September

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from

More information

The Internet of the future: What could it be and what are the challenges

The Internet of the future: What could it be and what are the challenges The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and

More information

Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video

Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video Miguel Rio, John Mitchell, David Griffin, Eleni Mykoniati, Raul Landa, Richard Clegg Department of Electronic and

More information

Reaping the Full Benefits of a Hybrid Network

Reaping the Full Benefits of a Hybrid Network Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage

More information

MOTIVE (MObile Terminal Information Value added functionality) Project: IST-027659-STP. 6th Concertation Meeting of IST-FP6 Brussels, 21/03/2006

MOTIVE (MObile Terminal Information Value added functionality) Project: IST-027659-STP. 6th Concertation Meeting of IST-FP6 Brussels, 21/03/2006 (MObile Information Value added functionality) Project: IST-027659-STP 6th Concertation Meeting of IST-FP6 Brussels, 21/03/2006 Presentation Overview Project presentation Scope - Objectives Innovation

More information

Evolving Optical Transport Network Security

Evolving Optical Transport Network Security Evolving Optical Transport Network Security May 15, 2012 Prepared by: John Kimmins Executive Director 732-699-6188 jkimmins@appcomsci.com Copyright 2012 All Rights reserved 1 Outline Overview of Optical

More information

Security issues in Voice over IP: A Review

Security issues in Voice over IP: A Review www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu

More information

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

Huawei One Net Campus Network Solution

Huawei One Net Campus Network Solution Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,

More information

Design of Electronic Medical Record System Based on Cloud Computing Technology

Design of Electronic Medical Record System Based on Cloud Computing Technology TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based

More information

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between

More information

Introduction to Computer Networking: Trends and Issues

Introduction to Computer Networking: Trends and Issues Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Indo-US Collaboration in Engineering Education (IUCEE) Webinar,

More information

Low-Carbon Routing Algorithms For Cloud Computing Services in IP-over-WDM Networks

Low-Carbon Routing Algorithms For Cloud Computing Services in IP-over-WDM Networks IEEE ICC 2012 - Optical Networks and Systems Low-Carbon Routing Algorithms For Cloud Computing Services in IP-over-WDM Networks Mirko Gattulli, Massimo Tornatore, Riccardo Fiandra, Achille Pattavina Department

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

International Open Workshop on Optical Communications Systems and Networks

International Open Workshop on Optical Communications Systems and Networks International Open Workshop on Optical Communications Systems and Networks Multilayer Traffic Monitoring for efficient network planning, operating and troubleshooting Josep Solé-Pareta pareta@ac.upc.edu

More information

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6 Dr Christos Anagnostopoulos 1. Education Ph.D. in Computer Science Department of Informatics & Telecommunications, National and Kapodistrian University of Athens, July 2008 Dissertation: Pervasive and

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

Huawei Agile WAN Solution

Huawei Agile WAN Solution Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service

More information

WDM Passive Optical Networks: Protection and Restoration

WDM Passive Optical Networks: Protection and Restoration OECC 2009 Workshop: Next-generation Broadband Optical Access Future Challenges Session 1: Broadband Network Architectures, WDM PON Evolution Strategies and Future Ultra-high- bandwidth Services WDM Passive

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

THE FUTURE OF SMART GRID COMMUNICATIONS

THE FUTURE OF SMART GRID COMMUNICATIONS THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,

More information

How To Make A Cell Phone Converged Into A Cell Network

How To Make A Cell Phone Converged Into A Cell Network MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

High Performance Computing for Wireless Telecom Research

High Performance Computing for Wireless Telecom Research High Performance Computing for Wireless Telecom Research Maziar Nekovee BT Research & University College London maziar.nekovee@bt.com T. Hewer, R. Saksena, P. V. Coveney (UCL) Keith Briggs, S. Kawade,

More information

PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS

PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS www.massif-project.eu Dr Andrew Hutchison T-Systems (andrew.hutchison@t-systems.com) MAanagement of Security information and events

More information

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES IJITE Vol. 4 No.1-2 January-December 2013, pp.13-17 International Sciences Press DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES D. Lakshmana Kumar 1 and G. Draksha 2 1 M.Tech. Student, Department

More information

DIADEM Firewall (Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D)

DIADEM Firewall (Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D) (Distributed Adaptative Security by Programmable Firewall) 9-10 March 2004 Yannick CARLINET (France Telecom R&D) Fact sheet 7 partners from 6 countries 4 academic partners: University of Tübingen (germany),

More information

Call for Papers for Next-Generation Networking and Internet Symposium

Call for Papers for Next-Generation Networking and Internet Symposium Call for Papers for Next-Generation Networking and Internet Symposium Scope and Motivation: The focus of the Next-Generation Networking Symposium includes emerging topics in the broad area of networking,

More information

A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service

A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service A Quality of Service Performance Evaluation Strategy for Delay Classes in General Packet Radio Service P. Calduwel Newton 1 and L. Arockiam 2 1 Assistant Professor in Computer Science, Bishop Heber College

More information

NETWORK TO NETWORK INTERFACE PLAN

NETWORK TO NETWORK INTERFACE PLAN AT&T will provide interconnect points at both the Network Security Operations Center (NSOC) and the Sam Houston Building (SHB), the prescribed DIR locations via AT&T s VPN (AVPN) service. The standards-based

More information

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

Optical Networking for Data Centres Network

Optical Networking for Data Centres Network Optical Networking for Data Centres Network Salvatore Spadaro Advanced Broadband Communications Centre () Universitat Politècnica de Catalunya (UPC) Barcelona, Spain spadaro@tsc.upc.edu Workshop on Design

More information

How To Find A Vpn Wan Solution

How To Find A Vpn Wan Solution Sorting Out the Alphabet Soup of VPN Solutions A practical approach to assessing WAN technologies that support your distributed organization s diverse needs Get Started Now: 877.611.6342 to learn more.

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,

More information

Optimal Mixtures of Different Types of Recovery Schemes in Optical Networks

Optimal Mixtures of Different Types of Recovery Schemes in Optical Networks Optimal Mixtures of Different Types of Recovery Schemes in Optical Networks David Griffith, Kotikalapudi Sriram, Stephan Klink, and Nada Golmie National Institute of Standards and Technology (NIST) Bureau

More information

How To Prevent Network Attacks

How To Prevent Network Attacks Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

B.Sc. degree in Computer Science, with honors, 1986 Technion, Israel Institute of Technology (IIT), Haifa, Israel

B.Sc. degree in Computer Science, with honors, 1986 Technion, Israel Institute of Technology (IIT), Haifa, Israel Education: D.Sc. degree in Computer Science,1994 Research subject: Protocols for Spatial and Slot Reuse in Bus Networks Research: Distributed algorithms, MAC protocols for wired and wireless networks.

More information

Solution Brief. Secure and Assured Networking for Financial Services

Solution Brief. Secure and Assured Networking for Financial Services Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

How to Detect and Prevent Cyber Attacks

How to Detect and Prevent Cyber Attacks Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division

More information

Cyber Security Through Visualization

Cyber Security Through Visualization Cyber Security Through Visualization Kwan-Liu Ma Department of Computer Science University of California at Davis Email: ma@cs.ucdavis.edu Networked computers are subject to attack, misuse, and abuse.

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014 Alessia Garofalo Ph.D. Student in Information Engineering University of Naples «Parthenope» Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks Fai della Paganella, 10-12/02/2014

More information

Applications' of Cloud Computing in Academic Institutions

Applications' of Cloud Computing in Academic Institutions Applications' of Cloud Computing in Academic Institutions Muhammad Mannir Ahmad Getso University of East London Kuala Lumpur Malaysia manniru@gmail.com Riyaz Ahmed A. H. School of Engineering & Computing

More information

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation

More information

DESIGN OF INTELLIGENT DEVICE TO SAVE STANDBY POWER IN NETWORK ENABLED DEVICES

DESIGN OF INTELLIGENT DEVICE TO SAVE STANDBY POWER IN NETWORK ENABLED DEVICES International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 216, pp. 54-61, Article ID: IJCET_7_1_7 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat. Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the

More information

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Converged Private Networks. Supporting voice and business-critical applications across multiple sites Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice

More information

Self-organized Multi-agent System for Service Management in the Next Generation Networks

Self-organized Multi-agent System for Service Management in the Next Generation Networks PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

Cloud Computing and Software Agents: Towards Cloud Intelligent Services

Cloud Computing and Software Agents: Towards Cloud Intelligent Services Cloud Computing and Software Agents: Towards Cloud Intelligent Services Domenico Talia ICAR-CNR & University of Calabria Rende, Italy talia@deis.unical.it Abstract Cloud computing systems provide large-scale

More information

Master of Science (Electrical Engineering) MS(EE)

Master of Science (Electrical Engineering) MS(EE) Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant

More information

University of Nicosia, Cyprus

University of Nicosia, Cyprus University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-513 Computer Networks and 10 Web Technologies Department Semester Prerequisites Computer Science Spring None Type of Course Field

More information

Articles IEEE have removed from their database

Articles IEEE have removed from their database Articles IEEE have removed from their database Application of Game-Theoretic and Virtual Algorithms in Information Retrieval System 2008 International Conference on MultiMedia and Information Technology

More information

Cloud Security - Risiken und Chancen

Cloud Security - Risiken und Chancen Dr. Matthias Schunter, MBA IBM Research Zürich, mts@zurich.ibm.com, http://www.schunter.org Simple Questions Today s Data Center Tomorrow s Public Cloud We Have Control It s located at X. It s stored in

More information

PART D NETWORK SERVICES

PART D NETWORK SERVICES CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

Securing the Mobile Enterprise with Network-Based Security and Cloud Computing

Securing the Mobile Enterprise with Network-Based Security and Cloud Computing Securing the Mobile Enterprise with Network-Based Security and Cloud Computing Gustavo de los Reyes, Sanjay Macwan, Deepak Chawla, Cristina Serban AT&T Security Research Center {gdelosreyes, sjm, dchawla,

More information

Networking Research: Trends and Issues

Networking Research: Trends and Issues 1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of

More information

Basheer Al-Duwairi Jordan University of Science & Technology

Basheer Al-Duwairi Jordan University of Science & Technology Basheer Al-Duwairi Jordan University of Science & Technology Assistant Professor Department of Network Engineering & Security @ JUST Education: PhD, Iowa State University, 2005 Ms, Iowa State University,

More information

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks Ahmad Patooghy Department of Computer Engineering Iran University of Science & Technology Tehran, Iran patooghy@iust.ac.ir

More information

Bio-inspired mechanisms for efficient and adaptive network security

Bio-inspired mechanisms for efficient and adaptive network security Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany dressler@informatik.uni-erlangen.de

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

How To Protect Your Mobile From Attack From A Signalling Storm

How To Protect Your Mobile From Attack From A Signalling Storm ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem

More information

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass Real-time Network Monitoring and Security Platform for Securing Next-Generation Network Assoc. Prof. Dr. Sureswaran Ramadass The platform Definition A description of a software framework that makes services

More information

MSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526

MSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526 MSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526 1. Introduction The field of Information Technology has been a continuously expanding

More information

International Journal of Computer Sciences and Engineering Open Access. Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm

International Journal of Computer Sciences and Engineering Open Access. Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm Garima Malik

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Efficient Security Alert Management System

Efficient Security Alert Management System Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565

!! # $%!& $!$ +) * ', -./01.//1233/ 4, -./01.//12223 *, 565 !! "# $%!& '(!)**+* $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565 1 Content CRUTIAL testbeds - objectives The Telecontrol Testbed platform Critical scenarios - plotted demo Experimental results The

More information

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation

More information

SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS

SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS Christian HÄGERLING Fabian M. KURTZ Christian WIETFELD TU Dortmund University Germany

More information

Network Security Using Hybrid Port Knocking

Network Security Using Hybrid Port Knocking 8 Network Security Using Hybrid Port Knocking Dr. Hussein Al-Bahadili and Dr. Ali H. Hadi, Arab Academy for Financial Sciences, faculty of Information Technology, Amman Jordan Arab Academy for Financial

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Keywords: WMSN, MCC, NIST

Keywords: WMSN, MCC, NIST Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cheating Proof

More information

Optical Networks for Next Generation Disaster Recovery Networking Solutions with WDM Systems Cloud Computing and Security

Optical Networks for Next Generation Disaster Recovery Networking Solutions with WDM Systems Cloud Computing and Security Optical Networks for Next Generation Disaster Recovery Networking Solutions with WDM Systems Cloud Computing and Security By Andrew MacKay, Chief Technology Officer, Superna www.superna.net Legacy Data

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation

An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation 1 An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation Xiaomin Chen, Yuesheng Zhong, Admela Jukan Technische Universität Carolo-Wilhelmina zu Braunschweig Email: chen@ida.ing.tu-bs.de,y.zhong@tu-bs.de,

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

End-to-End Dedicated Protection in Multi-Segment Optical Networks

End-to-End Dedicated Protection in Multi-Segment Optical Networks End-to-End Dedicated Protection in Multi-Segment Optical Networks Srinivasan Seetharaman, Admela Jukan and Mostafa Ammar Georgia Institute of Technology, Atlanta, GA Email: {srini, ajukan, ammar}@cc.gatech.edu

More information

SpiderCloud E-RAN Security Overview

SpiderCloud E-RAN Security Overview SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5

More information

Designing and Developing Scalable IP Networks

Designing and Developing Scalable IP Networks Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii

More information

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,

More information

Firewall and VPN Investigation on Cloud Computing Performance

Firewall and VPN Investigation on Cloud Computing Performance Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation

More information

Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval

Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval 0677 Q1 6,536 12 United States 2 Swarm and Evolutionary Computation 2210 6502 Q1 3,364 8 Netherlands 3 IEEE Transactions

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information