Science Articles

Isolating SDN control traffic with layer-2 slicing in 6TiSCH industrial IoT networks. 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).

Improving Resources Management in Network Virtualization by Utilizing a Software-Based Network. Wireless Personal Communications.

Network virtualization is a way to simultaneously run multiple heterogeneous architectures on a shared substrate. The main issue in network virtualization is mapping virtual networks to substrate network. How to manage substrate resources in mapping phase will have an effective …

Detecting straggler MapReduce tasks in big data processing infrastructure by neural network. The Journal of Supercomputing.

Straggler task detection is one of the main challenges in applying MapReduce for parallelizing and distributing large-scale data processing. It is defined as detecting running tasks on weak nodes. Considering two stages in the Map phase (copy, combine) and three …

Comparison of the performance of the two different UWB antennas for the use in WBAN on-body communication. 2012 6th European Conference on Antennas and Propagation (EUCAP).

Automated border control e-gates and facial recognition systems. Computers & Security, 62, 49–72.

A fast automated biometric solution has been proposed to satisfy the future border control needs of airports resulting from the rapid growth in the number of passengers worldwide. Automated border control (ABC) systems handle the problems caused by this growth, …

Automated border control e-gates and facial recognition systems. Computers & Security, 62, 49–72.

A fast automated biometric solution has been proposed to satisfy the future border control needs of airports resulting from the rapid growth in the number of passengers worldwide. Automated border control (ABC) systems handle the problems caused by this growth, …

An intelligent botnet blocking approach in software defined networks using honeypots. Journal of Ambient Intelligence and Humanized Computing.

Using a massive number of coordinated and distributed machines, botnets have become one of the most sophisticated cyber threats. However, software defined networking leads to more effective mitigation approaches by providing a flexible and dynamic way to control the network. …
  • chevron_left
  • 1
  • chevron_right