Search
Now showing items 1-10 of 10
HLAF: heterogeneous-latency adaptive forwarding strategy for peer-assisted video streaming in NDN.
(IEEE, 2017-09)
Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for ...
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)
Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...
Optimization of decentralized payment system for future internet
(Technological University of the Shannon Midlands Midwest, 2022)
With the development of Internet,
the future Internet architecture will
have many features. For example,
the high volume of content together
with new emerging and missioncritical applications, that it will
possibly ...
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)
Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ...
Transmission of 3D video content
(SpringerLink, 2019-07-29)
This chapter describes different video transport technologies that support the existing 3D video formats, such as frame-compatible side-by-side and multi-view video plus depth. Particular emphasis is given to the DVB systems ...
B-ICP: Backpressure Interest Control Protocol for Multipath Communication in NDN.
(IEEE, 2018-01)
Named Data Networking (NDN) is a promising communication paradigm to support content distribution for the Future Internet. The objective of this paper is to maximize the consumer downloading rate by retrieving content via ...
PIoT: Programmable IoT using Information Centric Networking.
(IEEE, 2016)
The Internet of Things (IoT) places significant
demands on network infrastructure in order to process data
captured by ubiquitous sensor devices. One existing technique to
support this sensor data processing involves ...
Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks
(Elsevier, 2022-04-22)
Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high ...
Pixdoor: a pixel-space backdoor attack on deep learning models
(IEEE, 2021-08-23)
Deep learning algorithms outperform the machine
learning techniques in various fields and are widely deployed
for recognition and classification tasks. However, recent research
focuses on exploring these deep learning ...
Invisible encoded backdoor attack on DNNs using conditional GAN
(IEEE, 2023-02-17)
Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification and vision tasks. However, recent research focuses on exploring these Deep Neural Networks (DNNs) weaknesses ...