|
|
|
Nikos Fotiou
Information-Centric Networking (ICN) is novel paradigm considered for the future Internet, as well as for emerging architectures, such as the Internet of Things. Despite the significant research efforts that take place all around the world there are stil...
ver más
|
|
|
|
|
|
|
Nikos Fotiou and George C. Polyzos
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s...
ver más
|
|
|
|
|
|
|
Imad Jawhar, Nader Mohamed, Jie Wu and Jameela Al-Jaroodi
-
|
|
|
|
|
|
|
Khalid Alsubhi, Bander Alzahrani, Nikos Fotiou, Aiiad Albeshri and Mohammed Alreshoodi
Modern internet of things (IoT) applications can benefit from advanced communication paradigms, including multicast and anycast. Next-generation internet architectures, such as information-centric networking (ICN), promise to support these paradigms, but...
ver más
|
|
|
|
|
|
|
Swaroopa Korla and Shanti Chilukuri
Recent interest in applications where content is of primary interest has triggered the exploration of a variety of protocols and algorithms. For such networks that are information-centric, architectures such as the Content-Centric Networking have been pr...
ver más
|
|
|
|
|
|
|
Muhammad Aneeq Abid, Naokhaiz Afaqui, Muazzam A. Khan, Muhammad Waseem Akhtar, Asad Waqar Malik, Arslan Munir, Jawad Ahmad and Balawal Shabir
The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for human intervention. The IoT has brought the future closer to us. It has opened u...
ver más
|
|
|
|
|
|
|
Konstantina Fotiadou, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou and Theodore Zahariadis
Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems. In this work, we propose novel Deep Learni...
ver más
|
|
|
|
|
|
|
Wondimu Zegeye, Richard Dean, Mulugeta Dugda, Farzad Moazzami and Andargachew Bezabih
This paper presents the modeling of the networks supporting today?s telemetry. The incorporation of networking features has significantly enhanced the capability and performance of modern telemetry systems. The development of Integrated Network-Enhanced ...
ver más
|
|
|
|
|
|
|
Gourav Prateek Sharma, Wouter Tavernier, Didier Colle and Mario Pickavet
Broadcasters are building studio architectures based on commercial off-the-shelf (COTS) IT hardware because of advantages such as cost reduction, ease of management, and upgradation. Media function virtualization (MFV) leverages IP networking to transpor...
ver más
|
|
|
|
|
|
|
Francesco Chiti, Romano Fantacci, Roberto Picchi and Laura Pierucci
The creation of the future quantum Internet requires the development of new systems, architectures, and communications protocols. As a matter of fact, the optical fiber technology is affected by extremely high losses; thus, the deployment of a quantum sa...
ver más
|
|
|
|
|
|
|
Kyi Thar Ko, Htet Htet Hlaing and Masahiro Mambo
Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery. Because ...
ver más
|
|
|
|
|
|
|
Symeon Papavassiliou
The role of Software Defined Networking (SDN) and Network Function Virtualization (NFV) have been instrumental in realizing the transition and vision ?from black boxes to a white box towards facilitating 5G network architectures?. Though significant rese...
ver más
|
|
|
|
|
|
|
Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele and ?Shade Kuyoro
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt t...
ver más
|
|
|
|
|
|
|
Mattia D?Emidio and Daniele Frigioni
The purpose of this special issue of Algorithms was to attract papers presenting original research in the area of algorithm engineering. In particular, submissions concerning the design, analysis, implementation, tuning, and experimental evaluation of di...
ver más
|
|
|
|
|
|
|
Christos K Liaskos,George C Koutitas,Ioannis P Vlahavas
Pág. pp. 15 - 21
Virtual laboratories have evolved into an adequately mature educational tool for multiple fields of study. Their use is especially beneficial to modern topics such as modern wireless communications. Related solutions in this field explored various ap...
ver más
|
|
|
|
|
|
|
Susanna Spinsante,Ennio Gambi
Pág. 101 - 108
Home Area Networks designed for the delivery of both multimedia contents (e.g. TV programs, movies, music) and home automation services (e.g. household appliances commands, lighting and surveillance controls) are becoming widespread, especially thanks to...
ver más
|
|
|
|
|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Lei Gao and Xiaoyong Zhu
With the rapid growth of internet traffic, the traditional host-to-host TCP/IP architecture is subject to many service limitations faced with content-oriented applications. Various novel network architectures have been proposed to solve these limitations...
ver más
|
|
|
|
|
|
|
Jiaqi Li, Jiali You and Haojiang Deng
Information-centric networking (ICN) is an emerging network architecture that has the potential to address low-transmission latency and high-reliability requirements in the fifth generation and beyond communication networks (5G/B5G). In the ICN architect...
ver más
|
|
|
|
|
|
|
Cheng Qian, Xing Liu, Colin Ripley, Mian Qian, Fan Liang and Wei Yu
The Internet of Things (IoT) connects massive smart devices to collect big data and carry out the monitoring and control of numerous things in cyber-physical systems (CPS). By leveraging machine learning (ML) and deep learning (DL) techniques to analyze ...
ver más
|
|
|
|