Supervised feature selection techniques in network intrusion detection: A critical review
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
Merged glowworm swarm with ant colony optimization for energy efficient clustering and routing in wireless sensor network
DL Reddy, C Puttamadappa, HN Suresh - Pervasive and Mobile …, 2021 - Elsevier
Abstract Nowadays, in Wireless Sensor Network (WSN), the ability to transfer data over the
network via a better route seems to be the tactic aspect due to certain criteria like network …
network via a better route seems to be the tactic aspect due to certain criteria like network …
Hybrid optimization algorithm for security aware cluster head selection process to aid hierarchical routing in wireless sensor network
DL Reddy, CG Puttamadappa… - IET …, 2021 - Wiley Online Library
In wireless sensor networks, clustering is said to be the most noteworthy technique for
increasing the lifetime of network that directly leads a better routing mechanism. This …
increasing the lifetime of network that directly leads a better routing mechanism. This …
Availability model for data center networks with dynamic migration and multiple traffic flows
J Zhu, N Huang, J Wang, X Qin - IEEE Transactions on Network …, 2023 - ieeexplore.ieee.org
The evaluation of application availability is a crucial step in ensuring functionality of the data
center network (DCN). The application of data center network is no more a chain of physical …
center network (DCN). The application of data center network is no more a chain of physical …
Petri net-based reliability assessment and migration optimization strategy of SFC
L Rui, X Chen, Z Gao, W Li, X Qiu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the development of information technology, the network consists of various proprietary
hardware devices, and the use of these devices brings problems. To solve problems …
hardware devices, and the use of these devices brings problems. To solve problems …
Network-aware availability modeling of an end-to-end NFV-enabled service
Network Function Virtualization (NFV) represents a key shift in nowadays network service
provisioning by entailing higher flexibility, elasticity, and programmability of network …
provisioning by entailing higher flexibility, elasticity, and programmability of network …
Model-driven availability assessment of the NFV-MANO with software rejuvenation
Network Function Virtualization enables network operators to modernize their networks with
greater elasticity, network programmability, and scalability. Exploiting these advantages …
greater elasticity, network programmability, and scalability. Exploiting these advantages …
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification
S Azadiabad, F Khendek - Journal of Network and Systems Management, 2024 - Springer
In the context of Network Function Virtualization (NFV), Network Services (NS) are realized
by interconnecting Virtual Network Functions (VNF) using Virtual Links (VL). Service …
by interconnecting Virtual Network Functions (VNF) using Virtual Links (VL). Service …
Petri net-based model for 5G and beyond networks resilience evaluation
The promise of telecommunication networks to deliver more demanding and complex
applications requires them to become more flexible and efficient. To achieve better …
applications requires them to become more flexible and efficient. To achieve better …
Modeling and evaluating NFV-enabled network services under different availability modes
Network and Telecom operators are continuously embracing the adoption of Network
Function Virtualization (NFV) as a means to provide more agile, flexible and cost-efficient …
Function Virtualization (NFV) as a means to provide more agile, flexible and cost-efficient …