Search
Now showing items 1-7 of 7
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)
The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ...
MCP2P: Layer-dependency-aware live MVC video streaming over peer-to-peer networks.
(Elsevier, 2018-07)
Multiview video supports observing a scene from different viewpoints. The Joint Video Team (JVT) developed H.264/MVC to enhance the compression efficiency for multiview video, however, MVC encoded multiview video (MVC ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)
Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ...
PTP: path-specified transport protocol for concurrent multipath transmission in named data networks.
(Elsevier, 2018-10)
Named Data Networking (NDN) is a promising Future Internet architecture to support content distribution. Its inherent addressless routing paradigm brings valuable characteristics to improve the transmission robustness and ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer International Publishing, 2018)
Cyber security has become one of the most challenging as-
pects of modern world digital technology and it has become imperative
to minimize and possibly avoid the impact of cybercrimes. Host based
intrusion detection ...
An architecture pattern for trusted orchestration in IoT Edge clouds.
(IEEE, 2018-04)
Fog and edge architectures provide a link between centralised clouds and the world of IoT and sensors. The architectures consist of devices of different sizes that coordinate the communication with sensors and cloud services, ...
A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding.
(Springer, 2018-02)
This paper presents a new combined neural network and chaos based pseudorandom
sequence generator and a DNA-rules based chaotic encryption algorithm for secure
transmission and storage of images. The proposed scheme uses ...