iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Network
جزئیات خدمات ترجمه در ترجمه تخصصی
security
security
security
security
network
[]
spectrum
energy
energy
energy
[]
deadlines
شبکه های کامپیوتری
deadlines
deadlines
شبکه های کامپیوتری
Figure
time
nodes
node
failures
grid
network
network
energy
[]
detection
detection
SWIFT
The Society for Wor
SWIFT
SWIFT
spectrum
[]
from
from
from
value
social
voltage
voltage
network
network
network
networks
SWIFT
security
Network Security
system
system
attack
[]
system
network
system
network
system
network
network security
network security
SWIFT
SWIFT
[]
Japanese
ability
ability
[]
caching
input
routing
routing
routing
routing
intrusion
intrusion
intrusion
cluster
routing
cluster
routing
cluster
cluster
routing
cluster
routing
cluster
[]
[]
network
network
network
customer
WIRELESS SENSOR NETWORK
network
node
[]
sensor
precipitation
sensor
identification
identification
identification
identification
identification
identification
identification
identification
migration
model
communication
network
2013 27th International Conference on Advanced Information Networking and Applications Workshops
Journal of Computer Science 10 (1): 85-90, 2014
Acta Astronautica 90 (2013) 367–377
Wireless Networking
1372 IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.61,NO.3,MARCH 2012
Anyone who is responsible for a private network that is
6 List of Table Table 1 classification of detection principal
6 List of Table Table 1 classification of detection principal
6 List of Table Table 1 classification of detection principal
Interested in learning
The role of common customer in business has changed to
ecommerce
Expert Systems with Applications 40 (2013) 315–322
Intrusion Detection
data center
083x_FMi.book Page i Thursday, July 3, 2003 12:49 PM
Subnet 10.1.6.0
Area Configuration on AlbuquerqueThe configuration correctly enables OSPF on
1 Introduction Wireless Fidelity (Wi-Fi) networks allow users with wireless-capable devices to access
FutureGenerationComputerSystems29(2013)1408–1416
Priorwork Prior workon CTPmostlyfocused onevaluatingthe performance of this protocolinstaticwireless sensor
In Tenth Annual International Conference on Mobile Computing and
In Tenth Annual International Conference on Mobile Computing and
FutureGenerationComputerSystems29(2013)1408–1416
With the passage of the Mine Improvement and New Emergency
WIRELESS SENSOR
In Tenth Annual International Conference on Mobile Computing and
ABSTRACT Wireless networks have displaced the well established and widely
ABSTRACT Wireless networks have displaced the well established and widely
In Tenth Annual International Conference on Mobile Computing and
In Tenth Annual International Conference on Mobile Computing and
In Tenth Annual International Conference on Mobile Computing and
Journal of Network and Computer Applications 41 (2014) 379–388
The configuration correctly enables OSPF on all three interfaces on
808 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 61, NO. 2, FEBRUARY 2014
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 1, FIRST QUARTER 2011
Mobile users can roam freelyacross a campus without changing IP
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
SOAMANET: A Tool for Evaluating Service-Oriented Architectures on Mobile Ad-
SOAMANET: A Tool for Evaluating Service-Oriented Architectures on Mobile Ad-
Catering to the complex and dynamically varying needs of business
Catering to the complex and dynamically varying needs of business
Discovery of Policy Anomalies
1
Distributed Firewall Policy Validation
PricewaterhouseCoopers (trading as PwC) is a multinational professional services network
PricewaterhouseCoopers
PricewaterhouseCoopers
PricewaterhouseCoopers
Lybrand
Lybrand
Lybrand
Lybrand
Lybrand
SWIFT
As we will see, both interior and exterior routing protocols achieve routing
Suvarna Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
Applied Soft Computing 12 (2012) 1875–1883
Computer Networks 57 (2013) 1714–1725
Correctness
Correctness
8
Network Working Group Barry M. Leiner
1017 RIACS August 1987 Network Requirements for Scientific Research Internet
RFC 1017 Requirements for Scientific Research August 1987 Bulk Transport
RFC 1017 Requirements for Scientific Research August 1987 Bulk Transport
RFC 1017 Requirements for Scientific Research August 1987 Yellow Pages
RFC 1017 Requirements for Scientific Research August 1987 Yellow Pages
Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies
A Simple Algorithm for Fault-Tolerant Topology
FLSS: A Fault-Tolerant Topology Control
Seema Mehla et. al. / (IJCSE) International Journal on Computer Science and Engineering
The Starfish and the Spider: The Unstoppable Power of Leaderless
The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations
Some Considerations for Secure-Architecture Experimental Infrastructure
CHAPTER 5
CHAPTER 5
Active Power Losses Constrained Optimization
Active Power Losses Constrained Optimization
Engineering Letters, 20:1, EL_20_1_09
Computer Communications 35 (2012) 619–627
The Journal of China
The Journal of China
The small company where you work needs to implement a
Elastic-BufferFlowControlforOn-ChipNetworks
International Journal of Future Generation Communication and Networking
How to get electricity at home To get electricity at
afheye 805
Bowling Online: Social Networking and
A. Sleman and R. Moeller: SOA Distributed Operating System for Managing Embedded Devices in Home and Building Automation 945
DANoC: A dynamic adaptive Network on Chip
DANoC: A dynamic adaptive Network on Chip
1 Overview This chapter addresses river basin planning and management
1 Overview This chapter addresses river basin planning and management
2.5 Communication Costs in Parallel Machines
&
The introduction of open and more flexible business models in
INVITED
.1 = 'I /T = -,-p (b!t/s)
European Journal of Operational Research 216 (2012) 459–468
European Journal of Operational Research 216 (2012) 459–468
European Journal of Operational Research 216 (2012) 459–468
Int. J. Advanced Networking and Applications 1323
صفحه 11 تا 15
Key Factor and Interaction for Network Performance
مقاله
یبصع یاَ ٍکبش زا ٌدافتسا اب ٌدىیآ مرت رد سيرد یضاقتم نایًجشواد دادعت
32 IEEE TRANSACTIONS ON COMPUTERS, VOL. 58, NO. 1, JANUARY 2009
the administrators possess too much data to dissect effectivelyto determine
شبکه
th
Networks-on-Chip in a Three-Dimensional Environment: A Performance Evaluation
Cloud computing offers different types of services depending on business
allowing visibility and granular control into WHO is accessing WHAT
CLOUD SERVICES DEPLOYMENT MODEL There are different types of deployment
CLOUD SERVICES DEPLOYMENT MODEL There are different types of deployment
There are different types of deployment model depending on the
SECURITY ISSUES OF CLOUD COMPUTING Security issues of cloud computing
FPGA-basedBiophysically-MeaningfulModelingof
WSNs invariably operate in an unattendedmode and inmany scenarios it
262 IEEE SYSTEMS JOURNAL, VOL. 4, NO. 2, JUNE 2010
Welcome to the Top of the Network
Welcome to the Top of the Network
Network Firewalls
Firewall Policy Modeling, Analysis and
Firewall Policy Modeling, Analysis and
Network Firewalls
Ali Ismail Awad
Ali Ismail Awad
A
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
INTRODUCTION Traditional network security devices such as Intrusion Detection Systems
Transmission Planning Considering Reliability and
1752 IEEE LATIN AMERICA TRANSACTIONS, VOL. 10, NO. 3, APRIL 2012
2011 First International Conference on Informatics and Computational Intelligence 2011 First International Conference on Informatics and Computational Intelligence
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012
security is a domain in which one or more individual
IMPACT OF DISTRIBUTED GENERATION ON VOLTAGE
Stability Index Abstract The research of practical operation of Distributed
NSSA technology is a research hot spot to enhance network
decision maker to analysis volumes of data from the devicesand
decision maker to analysis volumes of data from the devicesand
Network Firewalls
Network Firewalls
To appear in Smart Environments: Technologies, Protocols, and Applications
provides both data and control channels and handles up to
2.3.4. Commercially Available Wireless Sensor Systems Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
Many commercially available wireless communications nodes are available including Lynx Technologies, and various Bluetooth kits, including the Casira devices from Cambridge Silicon Radio, CSR.
2010 Second International Conference on Network Applications, Protocols and Services
security Cues through Interviews and Surveys The first of the
security Cues through Interviews and Surveys The first of the
Cyclic redundancy check circuit
2010 Second International Workshop on Education Technology and Computer Science
security Cues through Interviews and Surveys The first of the
CHAPTER 2
security This chapter outlines two different technology domains that have
security This chapter outlines two different technology domains that have
Future Work The work of implementing data fusion capabilities in
Journal of Network and Computer Applications 37 (2014) 380–392
A wide range of applications has been proposed for sensor
636 IEEE SENSORS JOURNAL, VOL. 14, NO. 3, MARCH 2014
Computer Standards & Interfaces 36 (2014) 278–287
636 IEEE SENSORS JOURNAL, VOL. 14, NO. 3, MARCH 2014
Computer Standards & Interfaces 36 (2014) 278–287
636 IEEE SENSORS JOURNAL, VOL. 14, NO. 3, MARCH 2014
636 IEEE SENSORS JOURNAL, VOL. 14, NO. 3, MARCH 2014
636 IEEE SENSORS JOURNAL, VOL. 14, NO. 3, MARCH 2014
636 IEEE SENSORS JOURNAL, VOL. 14, NO. 3, MARCH 2014
8
DEEN: a Simple and Fast Algorithm for
and machine learning The simplest AI applications can be divided
Classifiers and statistical learning methods The simplest AI applications can
Classifiers and statistical learning methods The simplest AI applications can
Classifiers and statistical learning methods The simplest AI applications can
8
Special Publication 800-41
Omega ∎ (∎∎∎∎) ∎∎∎–∎∎∎
1
1
0
TOPICS IN LIGHTWAVE
CHAPTER 2
Journal of Microbiological Methods 94 (2013) 86–87
1
population on earth has crossed 7 billions and is still
Electrical Power and Energy Systems 64 (2015) 671–678
Electrical Power and Energy Systems 64 (2015) 671–678
Electrical Power and Energy Systems 64 (2015) 671–678
population on earth has crossed 7 billions and is still
population on earth has crossed 7 billions and is still
population on earth has crossed 7 billions and is still
population on earth has crossed 7 billions and is still
population on earth has crossed 7 billions and is still
Project Management Knowledge Flows in Networks of Project Managers and
Journal of Network and Computer Applications 38 (2014) 185–201
NN 1172
W. Guo, W. Zhang / Journal of Network and Computer Applications 38 (2014) 185–201 187
CHAPTER 3
How NAT Works A router configured with NAT will have
are configured with private network addresses that are translated to
are configured with private network addresses that are translated to
are configured with private network addresses that are translated to
are configured with private network addresses that are translated to
201O 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)
1.6 / A MODEL FOR NETWORK SECURITY 19
1.8 / OUTLINE OF THIS BOOK 21
22 CHAPTER 1 / INTRODUCTION
24 CHAPTER 1 / INTRODUCTION
1.6 / A MODEL FOR NETWORK SECURITY 19
1.8 / OUTLINE OF THIS BOOK 21
22 CHAPTER 1 / INTRODUCTION
24 CHAPTER 1 / INTRODUCTION
Downloaded from http://bioinformatics.oxfordjournals.org/ at Aston University on January 9, 2014
*†
J. Basic. Appl. Sci. Res., 2(1)939-945, 2012 ISSN 2090-4304
A New Tool for
A New Tool for
A New Tool for
A New Tool for
11
J. Basic. Appl. Sci. Res., 2(1)939-945, 2012 ISSN 2090-4304
J. Basic. Appl. Sci. Res., 2(1)939-945, 2012 ISSN 2090-4304
Abstract Wireline telecommunications infrastructure in the customer access network or
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
www.ijecs.in
ISSN 2090-4304
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
Open access in next generation access (NGA) networks
IEEETRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.63,NO.2,FEBRUARY 2014 859
2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
2010 Second International conference on Computing, Communication and Networking Technologies
Landscape and Urban Planning 76 (2006) 45–66
Landscape and Urban Planning 76 (2006) 45–66
Landscape and Urban Planning 76 (2006) 45–66
Landscape and Urban Planning 76 (2006) 45–66
Danish municipalities are not permitted to provide broadband services directly. However, privately-
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012 21
Research ABSTRACT Traffic engineering involves adapting the routing of traffic
TOPICS IN INTERNET TECHNOLOGY
Research ABSTRACT Traffic engineering involves adapting the routing of traffic
ABSTRACT Traffic engineering involves adapting the routing of traffic to
Chapter 1: From legacy to breakthrough
102 IEEETRANSACTIONSONSMARTGRID,VOL.5,NO.1,JANUARY2014
Context-aware recommender for mobile learners
MASARYK UNIVERSITY
Hybrid Intelligent System
journal of information security and applications xxx (2014) 1e10
Chord: A Scalable Peer-to-peer Lookup Protocol
MASARYK UNIVERSITY
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
INTERNATIONAL TELECOMMUNICATION UNION
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Electrical Power and Energy Systems 33 (2011) 385–393
JURCA LAYOUT 5/22/07 12:51 PM Page 108
Egyptian Informatics Journal (2013) 14, 109–115
Electrical Power and Energy Systems 33 (2011) 550–555
IX: A Protected Dataplane Operating System for
ISSN (Print) : 2320 – 9798
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 19, NO. 8, AUGUST 2008 1329
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 19, NO. 8, AUGUST 2008 1329
Sensors 2012, 12, 12606-12633; doi:10.3390/s120912606
TABLE OF CONTENTS
International Journal of Accounting Information Systems 14 (2013) 127–137
Electrical Power and Energy Systems 33 (2011) 550–555
Expert Systems with Applications 40 (2013) 1240–1247
commerce is still growing and many new applications are constantly
An emerging way to sell and buy display ads on
Computer Networks 58 (2014) 254–283
2013 International Conference on Electrical Information and Communication Technology (EICT)
IEEE 802 Standardization on Heterogeneous
2013 International Conference on Electrical Information and Communication Technology (EICT)
IEEE 802 Standardization on Heterogeneous
Wireless Pers Commun (2014) 78:1683-1697
2013 International Conference on Electrical Information and Communication Technology (EICT)
The Next Generation Network
Detecting Distributed Denial of
OperationsResearchforHealthCare ( ) –
10th IEEE International Workshop on Wireless Local Networks WLN 2010, Denver, Colorado
10th IEEE International Workshop on Wireless Local Networks WLN 2010, Denver, Colorado
CHAPTER 10
852 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 2, MAY 2005
Expert Systems with Applications 38 (2011) 5428–5437
The Critical Security Controls
Social Science & Medicine 123 (2014) 90e95
A control system is a device or set of d eus vied ces to manage, command, dire,c or t
Computer
Distributed Data Mining in Peer-to-Peer Networks
CONNECTIONS 25(1): 49-61
Chapter 7
a single program can retrieve information stored in millions of
It works under the control of a set of Instructions
It works under the control of a set of Instructions
such as running a spreadsheet program or accessing information from
An Energy-Aware Methodology for Mapping and Scheduling of
It works under the control of a set of Instructions
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Prediction of Chaotic Time Series of RBF
the order throughput capacity of wireless communication networks has been
TheCostofaCloud:
SPRINGER BRIEFS IN COMPUTER SCIENCE
SPRINGER BRIEFS IN COMPUTER SCIENCE
SPRINGER BRIEFS IN COMPUTER SCIENCE
Data centers are becoming increasingly popular for the provisioning of
Early solutions implemented distributed algorithms formaking data center hardware energy
Toward Comprehensive Traffic Generation
518 IEEE SYSTEMS JOURNAL, VOL. 5, NO. 4, DECEMBER 2011
The large volume and sophistication of cyber attacks on enterprise
The large volume and sophistication of cyber attacks on enterprise
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
Wireless Pers Commun
Wireless Pers Commun
Wireless Pers Commun
Wireless Pers Commun
Discovering the influential users oriented to viral marketing
Computer Networks 63 (2014) 5–16
International Conference & Workshop on Recent Trends in Technology, (TCET) 2012
WIND ENERGYGENERATIONModelling and Control
The Internet has made it possible for people all over
business Model of Distance Education With the development of computer
Adaptive Learning Expert System’
2009 First International Conference on Evolving Internet 2009 First International Conference on Evolving Internet
technological evolution and changes in the regulatory and economic environment
FutureGenerationComputerSystems29(2013)1645–1660
ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 1, No.7 , January 2014
WIND ENERGY GENERATION Modelling and Control
Selecting Configuration Of Reverse Logistics
Ad Hoc Networks 24 (2015) 20–28
Ad Hoc Networks 24 (2015) 20–28
STOCK EXCHANGE INDEX PREDICTION USING HYBRID MODELS
International Conference on Computational Intelligence and Multimedia Applications 2007 International Conference on Computational Intelligence and Multimedia Applications 2007
ARTICLE IN PRESS
ABSTRACT
ABSTRACT
ABSTRACT
ABSTRACT
ABSTRACT
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
To appear in Smart Environments: Technologies, Protocols, and Applications
1
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
MOUFTAH_LAYOUT_Layout 7/2/14 3:44 PM Page 150
Knowledge and Process Management
Translate the following passages into fluent Farsi
2012 Ninth International Conference on Information Technology - New Generations 2012 Ninth International Conference on Information Technology- New Generations
Available online at www.sciencedirect.com
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Ad Hoc Networks xxx (2014) xxx–xxx
COMCOM 5017 No. of Pages 13, Model 5G
Berntenis and Ebeling BMC Bioinformatics 2013, 14:361
1
1950 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013
1950 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013
Effect of Network Simplification on Reliability of
I. J. Computer Network and Information Security, 2013, 10, 44-50
2009 First International Conference on Evolving Internet 2009 First International Conference on Evolving Internet
110 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014
Available online at www.sciencedirect.com
Contemporary Perspectives on Organizational Social
DistributedComputingBuildingBlocksforRationalAgents
Healthcare monitoring applications and wirelesssensor network prototypes
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
health monitoring
The aim of the virtual layer is to capture interactionswithout
wireless sensor network prototypes
Available online at www.sciencedirect.com
Int J Syst Assur Eng Manag (July-Sept 2012) 3(3):194–208
FRAUD DETECTION IN COMMUNICATIONS NETWORKS USING NEURAL AND
Data Mining in Financial Application Dongsong Zhang and Lina Zhou
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 14, NO. 4, FOURTH QUARTER 2012 1037
There are inherent vulnerabilities in the networking of computers for
FutureGenerationComputerSystems27(2011)555–563
Introduction There are inherent vulnerabilities in the networking of computers
Available online at www.sciencedirect.com
Electric Power Systems Research 77 (2007) 1297–1304
Electric Power Systems Research 77 (2007) 1297–1304
Sensors and Actuators A 185 (2012) 117– 126
5.7 Sampling Mixer 249
Basic Network Concepts This chapter covers the fundamental networking concepts
Basic Network Concepts This chapter covers the fundamental networking concepts
An Adaptive Cross-Layer Multichannel QoS-MAC
2011 International Conference on Broadband and Wireless Computing, Communication and Applications
2016 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.28,NO.2,MAY2013
I. J. Computer Network and Information Security, 2013, 10, 44-50
5.3. SHORTEST PATH COMPUTATION 71
5.3. SHORTEST PATH COMPUTATION 71
5.4. EVALUATION OF SPATIAL QUERIES OVER SPATIAL NETWORKS 75
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.3. SHORTEST PATH COMPUTATION 71
5.3. SHORTEST PATH COMPUTATION 73
5.4. EVALUATION OF SPATIAL QUERIES OVER SPATIAL NETWORKS 75
5.5. PATH MATERIALIZATION TECHNIQUES 79
5.3. SHORTEST PATH COMPUTATION 73
5.4. EVALUATION OF SPATIAL QUERIES OVER SPATIAL NETWORKS 75
5.5. PATH MATERIALIZATION TECHNIQUES 79
Dave Nelson
5.3. SHORTEST PATH COMPUTATION 73
5.4. EVALUATION OF SPATIAL QUERIES OVER SPATIAL NETWORKS 75
5.5. PATH MATERIALIZATION TECHNIQUES 79
Industrial
Chapter 7
the consciousattempts to change the structure or process of interaction
Chapter 7
182 IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.1,FEBRUARY2013
182 IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.1,FEBRUARY2013
206 IEEETRANSACTIONSONSMARTGRID,VOL.2,NO.1,MARCH2011
182
206 IEEETRANSACTIONSONSMARTGRID,VOL.2,NO.1,MARCH2011
182
206 IEEETRANSACTIONSONSMARTGRID,VOL.2,NO.1,MARCH2011
1960 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013
IEEETRANSACTIONSON SMARTGRID,VOL.2,NO.1,MARCH 2011 173
A Guide to
3.4 Virtual Clusters and Resource Management 161
Understanding
Understanding
Sensors and Actuators A 185 (2012) 117– 126
Journal of Network and Computer Applications 39 (2014) 191–201
Tunnelling and
INTRODUCTION Network coding is a promising paradigm that hasbeen shown
G Model
Recent research shows that random linear network coding is adapted
Recent research shows that random linear network coding is adapted
Information Sciences 265 (2014) 23–35
The Design Philosophy of the DARPA Internet Protocols
OpenFlow: EnablingInnovationinCampusNetworks
Chapter 5and chapter 6
1 A mission is a task or process that is
2013 International Conference on Computer Sciences and Applications
2013 International Conference on Computer Sciences and Applications
.. no -STR,h=10%
.. no -STR,h=10%
devices. Section II highlights the characteristics of the main spectrum currently available to IMT systems through the
System Intrusion Detection
Computer Communications 42 (2014) 1–23
OTN switching
the conscious attempts to change the structure or process of
�R
Deploying Video-on-Demand Services on Cable
This article was downloaded by: [Aston University]
2. Literature review This section describes past research related to stochastic shortest path modeling, and identifies the contribution of this
1 A mission is a task or process that is
Journal of Network and Computer Applications 35 (2012) 619–632
COMPNW 5373 No. of Pages 19, Model 3G
WANG LAYOUT 8/22/05 11:16 AM Page 57
The Impact of Advertising and Sales Promotion on Initial Purchase,
if the observed homophily is arising instead almost entirely from
15.3 Virus Filtering 333
The Impact of Advertising and Sales Promotion on Initial Purchase,
Network-aware Cloud Brokerage for
Network-aware Cloud Brokerage for
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
we let each node gather location information and find routing
we let each node gather location information and find routing
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
we let each node gather location information and find routing
4CORRELATION COMPONENTS AND ANALYSIS RESULTS Alert correlation is a multicomponent
1 Data Analysis The alert fusion component is particularly relevant
8 Attack Session Reconstruction The goal of the attack session
1 A mission is a task or process that is
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
the performance of the algorithm is very sensitive to the
International Journal of Computer Applications (0975 – 8887)
Modified Adhoc on Demand Routing
Network-aware Cloud Brokerage for
Transportation Research Part C 38 (2014) 73–84
134 C H A P T E R 3 E - c o mm e r c e I n f r a s t r u c t u r e : T h e I n t e r n e t , W e b , a n d M o b i l e P l a t f o r m
134 C H A P T E R 3 E - c o mm e r c e I n f r a s t r u c t u r e : T h e I n t e r n e t , W e b , a n d M o b i l e P l a t f o r m
Background and Overview Since the introduction of the first dispatch
46 Chapter3. Islanded-ModeDERControl forDistortedLoadCurrents
4 Alert Preprocessing Normalized alerts have a standardized name and
4 Alert Preprocessing Normalized alerts have a standardized name and
4 Alert Preprocessing Normalized alerts have a standardized name and
A Proposal of Millimeter-wave Multi-hop Mesh Wireless Network Architecture with
4.10 MultistepCorrelat ion
An Adaptive Feedback Control Scheme for Resource
An Adaptive Feedback Control Scheme for Resource
An Adaptive Feedback Control Scheme for Resource Allocation in Wireless
4 Alert Preprocessing Normalized alerts have a standardized name and
8 Attack Session Reconstruction The goal of the attack session
8 Attack Session Reconstruction The goal of the attack session
A neural network bid/no bid model: the case for
A neural network bid/no bid model: the case for
and which guarantees reliable delivery by means of acknowledgements and
Semester Thesis
FutureGenerationComputerSystems28(2012)155–162
41
Semester Thesis
7. Discussion
4. Social capital perspective
Third, this paper also contributes to organizational trust and innovation literature with a new perspective. Most prior
Third, this paper also contributes to organizational trust and innovation literature with a new perspective. Most prior
Computers and Electrical Engineering 38 (2012) 1062–1072
Computer Communications 33 (2010) 477–484
International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011
An efficient network intrusion detection
Automatic network intrusion detection: Current techniques
NETWORK INTRUSION DETECTION USING DATA
A Design and Implementation of Intrusion
2011 First International Conference on Informatics and Computational Intelligence 2011 First International Conference on Informatics and Computational Intelligence
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
Coming out of the WWE Royal Rumble weekend, it’s said that the only concrete matches for WrestleMania 31 are Sting vs. Triple H, John Cena vs. Rusev and Roman Reigns vs. Brock Lesnar for the WWE World Heavyweight Title.
Marissa Mayer Data mining is going through a signifi cant
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013
A Simplified Prediction Model for Urban Traffic
Air Traffic Flow of Genetic Algorithm to Optimize
Optimizing the Power Consumption of Mobile
Mobile photo sharingservice enables mobile users to upload images
IEEE TRANSACTIONS ON ENERGY CONVERSION, VOL. 24, NO. 2, JUNE 2009 493
IEEE TRANSACTIONS ON ENERGY CONVERSION, VOL. 24, NO. 2, JUNE 2009 493
Computer Networks 57 (2013) 179–196
J Netw Syst Manage (2011) 19:298–304
High-PerformanceHardwareMonitorstoProtectNetwork
In three months it tookover about 9 million Microsoft Windows
In three months it tookover about 9 million Microsoft Windows
A Dual-Band 2.45/6 GHz CMOS LNA Utilizing
The Journal of China
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
2 Collaborative Intrusion Detection Networks A collaborative intrusion detection network
IDN scalability can be achieved through completely decentralized topology design
I2
I2
I2
XIAO et al.: DESIGN OF NETWORK CODES FOR MULTIPLE-USER MULTIPLE-RELAY WIRELESS NETWORKS 3759
1 Introduction So far in this book we have focused
Reactive Power Compensation for Integration of
Computer Communications 30 (2007) 2649–2660
have held the decision sciences captive with the likes of
the Mobile IPv6 protocol incorporates a route optimization mechanism that
IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501
Special Publication 800-86
A Delay-Tolerant Network Architecture for Challenged
security Situation Awareness Problem This section highlights some of the
sensor data fusion has been recommended as a methodology to
security Situation Awareness Problem This section highlights some of the
s SA is the ability to recognize salient cues from
Messaging Default SIM settings Mobile Data Location Mode Recent location
Messaging Default SIM settings Mobile Data Location Mode Recent location
English ALIZE OrangeMG BASE Orange JO EGY MobiNiL OFL Off
UNICOM China_Mobile China Mobile China_Unicom China Unicom China_Telecom China Telecom
English ALIZE OrangeMG BASE Orange JO EGY MobiNiL OFL Off
Messaging Default SIM settings Mobile Data Location Mode Recent location
Mobile Phone
Mobile Phone
Engineering Science and Technology, an International Journal 17 (2014) 165e172
Engineering Science and Technology, an International Journal 17 (2014) 165e172
have held the decision sciences captive with the likes of
These definitions result in a view of functional cities as metropolitan
ISSN: 2278 – 1323
have held the decision sciences captive with the likes of
have held the decision sciences captive with the likes of
have held the decision sciences captive with the likes of
English ALIZE OrangeMG BASE Orange JO EGY MobiNiL OFL Off
Mobile Phone
Mobile Phone
Networking systems
Networking systems
Solving the Hidden and Exposed Terminal problems Using
TechnologicalForecasting&SocialChange90(2015)346–354
and media have put the network at the center of
Traffic Information Based Power Saving Mechanism
Sensors2011, 11,3381-3400;doi:10.3390/s110303381
Sensors2011, 11,3381-3400;doi:10.3390/s110303381
Sensors2011, 11,3381-3400;doi:10.3390/s110303381
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012)
Sensors2011, 11,3381-3400;doi:10.3390/s110303381
2013 3rd International Conference on Computer Science and Network Technology
A critical review of “End-to-end arguments in system design”
Using the network as platform will increase both media portability
Using the network as platform will increase both media portability
A critical review of “End-to-end arguments in system design”
Cognitive Decision Theory: Developing Models of Real-World Decision Behavior
Cognitive Decision Theory: Developing Models of Real-World Decision Behavior
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)
Computer Communications xxx (2015) xxx–xxx
WirelessPersCommun
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)
SPAGNA LAYOUT_Layout 1 4/1/13 1:34 PM Page 132
centric warfare capabilities has led to a greater need to
Chapter 11
Available Online at www.ijcsmc.com
Chapter 11
A Simple and Efficient Input Selection Function
Received August 1, 2010 / Accepted September 19, 2010 J. Technol. Manag. Innov. 2010, Volume 5, Issue 3
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
A Simple and Efficient Input Selection Function
thischapter focuses on challenges and approaches to integration of information
A Taxonomy and Survey of Content Delivery Networks
CSA is diffi cult due to the dynamic nature of
CSA is diffi cult due to the dynamic nature of
7 Towards Achieving Effective Cyber Situational Awareness CSA can be
CSA is diffi cult due to the dynamic nature of
an operational use case will be outlined using the previously
an operational use case will be outlined using the previously
Nodes or elements of thenetwork change very quickly and the
1 Capturing Threats and Attacks with Graphical Models In order
an operational use case will be outlined using the previously
1 Capturing Threats and Attacks with Graphical Models In order
Nodes or elements of thenetwork change very quickly and the
IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501
Pattern Recognition 46 (2013) 464–471
Data Communication Networks
network layer
Creating a social network dataset requires us to
NamedDataNetworking
A Survey of Optimization Models for Train
Mobile Agent Information Security in Ad-Hoc Network
A group of wireless mobile hosts making a temporary network
Clinical Neurophysiology xxx (2012) xxx–xxx
European Neuropsychopharmacology (2010) 20, 519–534
European Neuropsychopharmacology (2010) 20, 519–534
Int. J. Electron. Commun. (AEÜ) 69 (2015) 432–441
Applications of Operations Research
Network Layer: Part II
Network Layer: Part II
Rev. Confirming Pages
ONDM 2014, 19-22 May, Stockholm, Sweden
20I4 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC)
Advanced Secure Routing in Ad hoc mobile
RESILIENCE AND AVAILABILITY FOR VIDEO DEPLOYMENTS Service providers are continually
Available online at www.sciencedirect.com
RESILIENCE AND AVAILABILITY FOR VIDEO DEPLOYMENTS Service providers are continually
World Food Istanbul is the largest and most successful food and drink exhibition in Turkey. The event
Gowri.K et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7122-7125
Arbutus: Network-Layer Load Balancing for
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 359
Applied Energy 134 (2014) 114–124
Decision Support Systems 53 (2012) 490–498
it is difficult for computer security education to keep pace
it is difficult for computer security education to keep pace
Rev. Confirming Pages
2012 IEEE Symposium on Robotics and Applications(ISRA)
Globecom 2014 - Wireless Networking Symposium
Cisco Gigabit Ethernet WAN Modules do not support Power over
w
The Mobile Agents A mobile agent is a program that
w w
w w
w w
w w
w w
اینترنت اشیا
اینترنت اشیا - قسمت اول
CISCO 7200VXR SERIES ROUTER
Neurocomputing 156 (2015) 68–78
G Model
that doubles the performance of the previous generation engine for
that doubles the performance of the previous generation engine for
Optimization of Clustering in SPIN-C
This chapter presents replication and snapshot technologies and how they
Chapter
Globecom 2014 - Wireless Networking Symposium
Journal of Bionic Engineering 10 (2013) 383–395
Performance Evaluation of Routing Protocols for
A Survey on Security Issues in Cloud Computing
Purpose Built for the Hybrid WAN The ISR 4000 Series
2013 IEEE 27th International Conference on Advanced Information Networking and Applications
Electronic Notes in Theoretical Computer Science 171 (2007) 57–69
Clinical Neurophysiology xxx (2012) xxx–xxx
we looked into a different kind of honeypot systems which
An Evaluation Model of Supply Chain Performances Using 5DBSC and
An Evaluation Model of Supply Chain Performances Using 5DBSC
An Evaluation Model of Supply Chain Performances Using 5DBSC
Chapter 16
TCP/IP Tutorial and
Ecotoxicology and Environmental Safety 77 (2012) 28–34
Neurocomputing 139 (2014) 138–144
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
D.-M. Han and J.-H. Lim: Smart Home Energy Management System using IEEE 802.15.4 and ZigBee 1403
Journal of Network and Computer Applications 35 (2012) 619–632
A surveyoncoverageandconnectivityissuesinwirelesssensornetworks
Adaptive multi-flow opportunistic routing using learning automata
Search and Replication in
Electric Power Systems Research 122 (2015) 33–41
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
IEEE - 33044
Globecom 2014 - Wireless Networking Symposium
Globecom 2014 - Wireless Networking Symposium
2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control
A. Encryption gateway node
Renewable Energy 75 (2015) 173e186
Emotion Recognition from Speech:
Hindawi Publishing Corporation
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for.
IOSR Journal of Computer Engineering (IOSRJCE)
International Journal of Computer Applications (0975 – 8887)
System Architecture The system architecture vaguely shows how any honeypot
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 29, NO. 12, DECEMBER 2010 1973
Hindawi Publishing Corporation
Available online at www.sciencedirect.com
Computer Communications 44 (2014) 14–25
2011 International Conference on Risk and Engineering Management
Available online at www.sciencedirect.com
Des Autom Embed Syst
Moazen
2.2 The Blood Supply Chain Network Model 17
O on same link Data transferred at a fixed rate
O on same link Data transferred at a fixed rate
O on same link Data transferred at a fixed rate
356 IEEESIGNALPROCESSINGLETTERS,VOL.22,NO.3,MARCH2015
CogMesh: A Cluster-based Cognitive Radio
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2007 proceedings.
ISSN: 2278 – 7798
Available online at www.sciencedirect.com
A case study of the NetInf architecture abstract A large
Software defined networking for security enhancement in wireless mobile networks
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
use the terminal no monitor command to stop the terminal
Human Cancer Protein-Protein Interaction Network: A
Rural Wireless Broadband Internet Access in Wireless
. (کامپیوتر-امنیت-شبکه)
is a wireless network consists of large number of sensor
Wireless Sensor Network Security model using
This chapter presents replication and snapshot technologies and how they
This chapter presents replication and snapshot technologies and how they
This chapter presents replication and snapshot technologies
Experimentation
Data Communications and Networking
Exam Ref
Mathematical Biosciences264 (2015) 74–85
Mathematical Biosciences264 (2015) 74–85
ComputerStandards&Interfaces36(2014)480–488
2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control
1678 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY 2010
1678 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 25, NO. 3, JULY 2010
Master’s thesis
JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 3, MARCH 2010 211
Computer Networks 44 (2004) 643–666
IEEE Transactions on Power Delivery. Vol. 7, No. 3, July 1992
IEEE Transactions on Power Delivery. Vol. 7, No. 3, July 1992
1487
IEEE Transactions on Power Delivery. Vol. 7, No. 3, July 1992
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 50, NO. 4, AUGUST 2003 793
ZHENG LAYOUT_Layout 1 6/21/13 12:00 PM Page 34
Global Assessment Programme Toolkit Module 1
NeuroImage 52 (2010) 1059–1069
Automatic Detection ofPremature Ventricular Contraction Using Quantum
Developing an Integrated Drug Information System
782 JOURNAL OF NETWORKS, VOL. 5, NO. 7, JULY 2010
1Service quality dimensions The earliest service quality model was introduced
Web Semantics: Science, Services and Agents on the World Wide Web 8 (2010) 26–36
ZHENG LAYOUT_Layout 1 6/21/13 12:00 PM Page 34
NeuroImage 52 (2010) 1059–1069
IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.3,AUGUST2013 1415
Vehicular delay- toler ant
Vehicular delay- toler ant
Vehicular delay- toler ant
Automatic Detection ofPremature Ventricular Contraction Using Quantum
International Journal of Neural Networks
Information Sciences 180 (2010) 62–70
nd
ScienceDirect
Hybrid Approach for Routing in Vehicular Ad-hoc
ReviewArticle
ScienceDirect
WINTERS LAYOUT 8/3/06 1:29 PM Page 77
Chapter 5
IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.3,AUGUST2013 1415
The Internet’s TCP guarantees the reliable, in-order delivery of a stream of
ESWA 9499 No. of Pages 9, Model 5G
Simulation Environment for Design and Verification
FutureGenerationComputerSystems37(2014)284–296
Computer Networks 51 (2007) 1031–1051
ESWA 9499 No. of Pages 9, Model 5G
Master’s Thesis
2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems
2012 International Conference on Radar, Communication and Computing (ICRCC),
Australasian Universities Power Engineering Conference, AUPEC 2013, Hobart, TAS, Australia, 29 September - 3 October 2013
Automation in Construction 19 (2010) 134–141
European Journal of Operational Research 196 (2009) 996–1007
An analytic finite capacity queueing network model capturing the propagation of congestion and blocking
IEEETRANSACTIONSONINDUSTRIALINFORMATICS,VOL.9,NO.3,AUGUST2013 1415
Chapter 5
1. Introduction
1. Introduction
Network Technologies Explain the function of common networking protocols Identify
Network Technologies Explain the function of common networking protocols Identify
The attackers exactly use the radio jamming and battery exhaustion methods to
An Energy Aware Cellular Learning Automata Based
Batch scheduling of consolidated virtual machines based on their workload
9
Digital Elevation Model Based Hydro-processing
FEBS Open Bio 5 (2015) 251–256
Int. J. Electron. Commun. (AEÜ) 69 (2015) 455–457
2009 Second International Conference on Intelligent Computation Technology and Automation
2009 Second International Conference on Intelligent Computation Technology and Automation
2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2010), October 3-5, 2010, Penang, Malaysia
Innovation Services
White paper
Contents
2010 IEEE Symposium on Industrial Electronics and Applications (ISIEA 2010), October 3-5, 2010, Penang, Malaysia
Innovation Services
White paper
Contents
Evaluating Geostatistical and Neural Network Methods in Estimating Soil Saturated
Fuzzy Logic Implementation to Calculate
Fuzzy Logic Implementation to Calculate
Fuzzy Logic Implementation to Calculate
233
UDC 621.398: 681.3
Abstract This paper provides an overview of RADIUS deployment in
Abstract This paper provides an overview of RADIUS deployment in
International Journal of Engineering Research & Technology (IJERT)
Applied Soft Computing 14 (2014) 609–622
Applied Soft Computing 14 (2014) 609–622
Applied Soft Computing 14 (2014) 609–622
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
2015 29th International Conference on Advanced Information Networking and Applications Workshops
Network Security Function Virtualization(NSFV) towards Cloud computing with NFV
Journal of Network and Computer Applications 40 (2014) 307–324
2013 Ninth International Conference on Computational Intelligence and Security
1
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
IJITKMI Volume 7 • Number 1 • December 2013 pp. 87-91 (ISSN 0973-4414)
Alert association and tracking Associating IDS alerts that are hypothesized
High level information fusion assisted cyber defense Identifying the needs
Research on the Basic Characteristics, the Key
consumption of resources, to solve this problem, lightweight
Study on Security Architecture in the Internet of
Study on Security Architecture in the Internet of
Wireless Netw (2014) 20:1295–1311
The Bandwidth Adjustment in the Last Round (BA-LR) for WiMAX Network
Wang et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:143
Server Monitoring Network Management makes it simple to know exactly
1. Introduction
sensor data fusion has been recommended as a methodology to
sensor data fusion has been recommended as a methodology to
sensor data fusion has been recommended as a methodology to
5G Mobile Phone Concept
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
5G Mobile Phone Concept
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
The Internet of Things: Challenges & Security Issues
2013 Ninth International Conference on Computational Intelligence and Security
Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
ASurveyontheInternetofThingsSecurity
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
inventory and monitor all devices on your wired and wireless
Computers and Electrical Engineering 38 (2012) 1062–1072
computers & security 28 (2009) 18–28
sensor data fusion has been recommended as a methodology to
Sensors Sensors are devices that provide observation data for use
has opened up an opportunity for it to become a
1. Introduction
1. Introduction
Out of many
Integrated Architecture for Message Dissemination
Vehicular Communications 1 (2014) 53–66
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Cyber Attack Simulator This section presents a model for simulating
Cyber Attack Simulator This section presents a model for simulating
9 This section presents a model for simulating the behavior
TFS-18147;NoofPages10
�c
IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 7 | December 2014
Vehicular Communications 1 (2014) 53–66
Vehicular Communications 1 (2014) 53–66
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 13, NO. 2, SECOND QUARTER 2011 245
Int. J. Ad Hoc and Ubiquitous Computing, Vol. x, No. x, xxxx 1
Int. J. Production Economics 132 (2011) 131–145
Expert Systems with Applications 42 (2015) 2615–2623
A Signal Analysis of Network Traffic Anomalies
Expert Systems with Applications 42 (2015) 2615–2623
Journal of Accounting and Economics 55 (2014) 225–250
Research associated with each of these individual problems deserves entire
the first prerequisite for entry into theclub of smart cities
the first prerequisite for entry into theclub of smart cities
wireless convergence has become of particular interest recently because a
hello is a passion-based social network designed for thrill-seekers and daydreamers alike.
Available online at www.sciencedirect.com
The simulator allows for both cyber attacks that are initiated
PeerTIS – A Peer-to-Peer Traffic Information System
2 Gathering network information The first step in developing cyber
2 Gathering network information The first step in developing cyber
2 Gathering network information The first step in developing cyber
An overview of the femtocell conceptClaussen The femtocellconcept aims to
An overview of the femtocell conceptClaussen The femtocellconcept aims to
the focus is on the impact a specific attack has
A set of seven common attacks were carefully selected for
and need to move at wire speed in a wide
and need to move at wire speed in a wide
and need to move at wire speed in a wide
and need to move at wire speed in a wide
computers & security 27 (2008) 30–47
which included a high knowledge of and getting familiar with
International Journal of Computational Intelligence Research
IntJ AdvManufTechnol (2014)74:1393–1406
IntJ AdvManufTechnol (2014)74:1393–1406
Journal of Network and Computer Applications 45 (2014) 168–180
Risk Engineering
4. Ontologies
4. Ontologies
Expert Systems with Applications 41 (2014) 4309–4321
Engineering Applications of Artificial Intelligence 41 (2015) 195–206
Available online at www.sciencedirect.com
Expert PDF Trial Analyzing the
increasing the capacity and speed using a different radio interface
which monitors the details of power and energy use throughout
Linking social network analysis with the
Scientometrics
2015 IEEE 29th International Conference on Advanced Information Networking and Applications
2000 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013
ComputerCommunications67(2015) 1–10
Parallel Processing of Data from Very Large-Scale
Hindawi Publishing Corporation
Parallel Processing of Data from Very Large-Scale
Distributed Storage and Parallel Processing in
Integration of Wireless Sensor Networks and
Integration of Wireless Sensor Networks and
Expert PDF Trial Analyzing the
Advances in Information Security
Journal of Network and Computer Applications 37 (2014) 380–392
4 Simulation Results This section compares the performance of the
4 Simulation Results This section compares the performance of the
Hindawi Publishing Corporation
NLSR: Named-data Link State Routing Protocol
ISSN 2277-3061
Parallel Processing of Data from Very Large-Scale
Distrib Parallel Databases (2009) 26: 3–27
Parallel Processing of Data from Very Large-Scale
WhatisTumblr: AStatisticalOverviewandComparison
ICICES2014 - S.A.Engineering College, Chennai, Tamil Nadu, India
IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 29, NO. 1, JANUARY 2014 89
25
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
computers & security 53 (2015) 79e108
Towards a Cognitive TCP/IP Network Architecture
Distrib Parallel Databases (2009) 26: 3–27
Research Article
Journal of Business Research 67 (2014) 190–199
Computers & Operations Research 40 (2013) 273–281
pressures to strategise Alpha was formed early in the 2000s
Cluster Comput (2015) 18:1157–1169
Cluster Comput (2015) 18:1157–1169
IJRRAS 10 (2) ● February 2012 www.arpapress.com/Volumes/Vol10Issue2/IJRRAS_10_2_06.pdf
Fault Cases Management System for Avionics
An Ontology-based P2P Network for
Parallel Processing of Data from Very Large-Scale
Parallel Processing of Data from Very Large-Scale
Chapter 8
Chapter 4
72 4.1 Neural network modelling
Decision Support Systems 47 (2009) 105–114
Information Sciences 265 (2014) 167–175
Expert PDF Trial Analyzing the
Reliability Engineering and System Safety 132 (2014) 97–106
Reliability Engineering and System Safety 132 (2014) 97–106
Reliability Engineering and System Safety 132 (2014) 97–106
Reliability Engineering and System Safety 132 (2014) 97–106
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 61
Wireless Netw (2015) 21:1879–1889
Light Fidelity (Li-Fi): Towards All-Optical Networking
Wireless Netw (2015) 21:1879–1889
Light Fidelity (Li-Fi): Towards All-Optical Networking
WANG_LAYOUT.qxp_Layout 1/30/14 1:29 PM Page 122
2014 IEEE 25th International Symposium on Personal, Indoor and Mobile Radio Communications
Reliability Engineering and System Safety 132 (2014) 97–106
Reliability Engineering and System Safety 132 (2014) 97–106
netflow
is an emergingtechnology and day by day it is attracting
is an emergingtechnology and day by day it is attracting
INTRODUCTION
SECURITY PROBLEMS
SECURITY PROBLEMS
SECURITY PROBLEMS
Computer Communications 32 (2009) 814–827
processor systems are comprised of thousands of processors that need
processor systems are comprised of thousands of processors that need
Preface
Preface
Wireless Sensor Network is attracting uncountable application domains to sense
The horizons of optical networks are much more than high speed physical layer transport. An intelligent optical network design
The horizons of optical networks are much more than high speed physical layer transport. An intelligent optical network design
International Conference on Networking, Architecture, and Storage International Conference on Networking, Architecture, and Storage
Hoseini-Hesam05
Hoseini-Hesam06
Hoseini-Hesam07
Journal of Network and Computer Applications 39 (2014) 93–103
Computer Networks 57 (2013) 1714–1725
Introduction to
Information Processing and Management 48 (2012) 903–917
Cloud Infrastructure
®
Cloud Infrastructure
Hoseini-Hesam-San05
Hoseini-Hesam-San06
Hoseini-Hesam-San07
Hoseini-Hesam-San
Analyzing the Performance of Centralized Clustering Techniques for Realistic Wireless Sensor Network Topologies
Computers in Human Behavior 41 (2014) 342–350
Introduction to
®
J Internet Serv Appl (2010) 1: 7–18
NetLimiter overviewNetLimiter gives you full network control over your
Cloud Infrastructure
On 802.11 Standard and the WiFi Network
On 802.11 Standard and the WiFi Network
JID:BDR AID:27 /FLA [m5G; v1.152; Prn:14/05/2015; 16:34] P.1 (1-15)
International Journal of Engineering and Advanced Technology (IJEAT)
the provision of services such as network connectivity is usually
CHAPTER
and recover from the security attacks and also provides apseudo
and recover from the security attacks and also provides a
and recover from the security attacks and also provides a
Low Level Security Mechanisms
Information Fusion xxx (2013) xxx–xxx
Renewable and Sustainable Energy Reviews 53 (2016) 978–992
Renewable and Sustainable Energy Reviews 53 (2016) 978–992
Here the diagrams show data effective data transmission including various
ARTICLE IN PRESS
CHAPTER
ARTICLE IN PRESS
یملع تلااقم و باتک دولناد و شرافس
Optical Fiber Technology 26 (2015) 12–20
International Journal of Geology, Earth and Environmental Sciences ISSN: 2277-2081 (Online)
Nature and Science, 5(2), 2007, Azhar Affandi and Kunio Watanabe, Daily groundwater level fluctuation
An AEN is composed of a group of cooperating intelligent
1
1
1
Journal of Network and Computer Applications 57 (2015) 85–101
On 802.11 Standard and the WiFi Network
Journal of Network and Computer Applications 39 (2014) 93–103
A distributed approach Introduction Vehicular applications fall into two broad
Transportations Systems Modeling and Applications
Electrical Power and Energy Systems 43 (2012) 554–561
Author's Accepted Manuscript
Transportations Systems Modeling and Applications
Transportation systems and
Transportation systems and networks Transportation systems are composed of a
Reza Baradaran Hendi, Seyed-Jalal Seyed-Sheneva, Majid Gandomkar/ International Journal of
Reza Baradaran Hendi, Seyed-Jalal Seyed-Sheneva, Majid Gandomkar/ International Journal of
ZHANG_LAYOUT_Layout 1 7/17/14 2:26 PM Page 74
Network Attacks Detection Using Fuzzy Logic
7
Wireless Pers Commun (2015) 84:2035–2053
Sky Journal of Business Administration and Management Vol. 1(2), pp. 10 - 24, March, 2013
The Journal ofSystemsand Software 110 (2015) 122–135
7
7
7
Applied Energy 157 (2015) 688–698
Int. J. Production Economics 158 (2014) 290–299
2012 Second International Conference on Advanced Computing & Communication Technologies 2012 Second International Conference on Advanced Computing & Communication Technologies
ICAST 2008
WIRELESS SENSOR NETWORK SECURITY THREATS
2014 Fourth International Conference on Communication Systems and Network Technologies 2014 Fourth International Conference on Communication Systems and Network Technologies
2013 International Conference on Advanced Electronic Systems (ICAES)
IEEE - 31661
Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace), 1-3 July 2013, Melaka, Malaysia
2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
Knowledge-Based Systems 59 (2014) 108–120
TM
Then the resource everyone takes for granted is a major
7
7
7
7
UPS can develop the most efficient and effective way to
and Meridian to an aggregated system that can be controlled
A Security Oriented Approach to PMU Positioning
742 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.29,NO.2,MARCH2014
A Security Oriented Approach to PMU Positioning
742 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.29,NO.2,MARCH2014
A Security Oriented Approach to PMU Positioning
742 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.29,NO.2,MARCH2014
European Journal of Operational Research 239 (2014) 593–608
docking is a distribution strategy that enables the consolidation of
docking is a distribution strategy that enables the consolidation of
docking is a distribution strategy that enables the consolidation of
2012 Second International Conference on Advanced Computing & Communication Technologies 2012 Second International Conference on Advanced Computing & Communication Technologies
ICAST 2008
WIRELESS SENSOR NETWORK SECURITY THREATS
2014 Fourth International Conference on Communication Systems and Network Technologies 2014 Fourth International Conference on Communication Systems and Network Technologies
2013 International Conference on Advanced Electronic Systems (ICAES)
IEEE - 31661
Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace), 1-3 July 2013, Melaka, Malaysia
2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
2013 International Conference on Intelligent Systems and Signal Processing (ISSP)
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
On 802.11 Standard and the WiFi Network
Machina Research
Neural Networks and
Content delivery network specifications
Sky Journal of Business Administration and Management Vol. 1(2), pp. 10 - 24, March, 2013
Sky Journal of Business Administration and Management Vol. 1(2), pp. 10 - 24, March, 2013
International Journal of Advances in Engineering & Technology, Sept. 2013.
Hindawi Publishing Corporation
Cloud Computing Services and Virtualization Virtualization Services are changing the
Cloud Computing Services and Virtualization Virtualization Services are changing the
Hindawi Publishing Corporation
IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 5, NO. 3, JULY 2014 967
IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, VOL. 5, NO. 3, JULY 2014 967
Transport Policy ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Transport Policy ∎ (∎∎∎∎) ∎∎∎–∎∎∎
DCDIS A Supplement, Advances in Neural Networks, Vol. 14(S1) 328--337
DCDIS A Supplement, Advances in Neural Networks, Vol. 14(S1) 328--337
Web Browsing Performance ofWireless Thinclient ComputingABSTRACTWeb applications
Web Browsing Performance of Wireless Thinclient Computing ABSTRACT Web applications
Wireless Netw (2015) 21:2413–2424
Routing in Vehicular Ad Hoc
2012 International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
ARTICLE IN PRESS
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 415 #23
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 57, NO. 4, APRIL 2010 773
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 404 #12
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 406 #14
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 406 #14
7
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 32, NO. 20, OCTOBER 15, 2014 3373
Distributed Denial of Service attack on Cloud:
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 32, NO. 20, OCTOBER 15, 2014 3373
odisc
AminiNasab
61 Another possible procedure for selecting the training set is
Mobile Netw Appl (2015) 20:4–18
odisc
Journal of Network and Computer Applications 3 7 (20 1 4) 38 0 – 392
Journal of Network and Computer Applications 3 7 (20 1 4) 38 0 – 392
A comprehensive survey on vehicular Ad Hoc network
VEHICULAR AD HOC NETWORKS
Texts in Computer Science
A Switch Controlled Resistor Based CMOS PGA with DC Offset
2009 International Conference on Computational Intelligence and Security
Central geopolitical position Iran has long been of geostrategic importance
Central geopolitical position Iran has long been of geostrategic importance
located on each side of the Valiars Avenueat the North
located on each side of the Valiars Avenueat the North
WANG_LAYOUT.qxp_Layout 1/30/14 1:29 PM Page 122
Introduction to Bitcoin Mining
organising maps Another possible procedure for selecting the training set
Journal of Computer and Communications, 2015, 3, 164-173
organising maps Another possible procedure for selecting the training set
348 IEEE TRANSACTIONSON VEHICULARTECHNOLOGY,VOL.65, NO. 1, JANUARY 2016
348 IEEE TRANSACTIONSON VEHICULARTECHNOLOGY,VOL.65, NO. 1, JANUARY 2016
348 IEEE TRANSACTIONSON VEHICULARTECHNOLOGY,VOL.65, NO. 1, JANUARY 2016
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Nooroozi2
Chord: A Scalable Peer-to-peer Lookup Protocol
Chord: A Scalable Peer-to-peer Lookup Service for Internet
Chord: A Scalable Peer-to-peer Lookup Protocol
94
Chord: A Scalable Peer-to-peer Lookup Protocol
Egyptian Informatics Journal (2015) xxx, xxx–xxx
Social Media Social media is a new type of unpaid
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 27-37 (2004)
Available online at www.sciencedirect.com
Information
Information
822 Chapter 18. Structure Learning in Bayesian Networks
Computer Communications xxx (2014) xxx–xxx
Journal of World Business 49 (2014) 236–244
Journal of World Business 49 (2014) 236–244
Transportations Systems Modeling and Applications
94
Neural and Super-Turing Computing
2011 Eighth International Conference on Information Technology: New Generations
2011 Eighth International Conference on Information Technology: New Generations
Proceedings of the 34th Chinese Control Conference
Embedded Systems
Wireless Sensor Network Protocols
Wireless Sensor Network Protocols
ComputerNetworks38(2002)393–422
Wireless Sensor Networks
Survey on Context-Aware Publish/Subscribe
CITY LANDSCAPE Theran city landscape is composed by 5 major
Interested in learning
Interested in learning
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
a centralized optimal scheduling algorithm can be realized in the
a power manager which dynamically adjusts the set of active
Software-Defined Cloud Computing: Architectural
Praise for The Global Brain
Review of Available Transfer Capability Calculation
Review of Available Transfer Capability Calculation
NeuroImage 52 (2010) 1059–1069
SlideOR: Online Opportunistic Network Coding
Software Defined Networks This page is intentionally left blank Software Defined Networks
Special Publication 800-41
Computer Networks 52 (2008) 2292–2330
Computers and Electrical Engineering xxx (2015) xxx–xxx
IET Wireless Sensor Systems
CLOUD COMPUTING 2015 : The Sixth International Conference on Cloud Computing, GRIDs, and Virtualization
Electric Power Systems Research 136 (2016) 100–109
Electrical Power and Energy Systems 73 (2015) 665–673
LTE/SAE System Overview
Wireless Pers Commun (2012) 63:871–894
Computer Communications 42 (2014) 1–23
Sliding Modes for Anomaly Observation in TCP
Chapter 15
REVIEW
Interested in learning
JID:VEHCOM AID:19 /REV [m5G; v 1.137; Prn:24/09/2014; 11:59] P.1 (1-12)
Figure 1. Conventional Network Management
Figure 1. Conventional Network Management
Journal of Network and Computer Applications 39 (2014) 83–92
Downloaded form http://iranpaper.ir
2011 International Conference on Intelligence Science and Information Engineering
IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 16, NO. 4, FOURTH QUARTER 2014 1839
data can be directly exchanged between the mobile devices people
Chapter 1.3.4: The Dominance of Chaotic Dynamics
Distributed Database
Distributed Database
Distributed Database
computer network security بﺎﺗﮐ زا هدﺎﻔﺗﺳا تﺳاوﺧرد
Chapter 15
necessary arrangements to ensure that communica-
FriendshipPredictionandHomophilyinSocialMedia
Intelligent Traffic Information System Based on Integration of Internet of
SRX Series gateways set new benchmarks with 100GbE interfaces and
2010 International Conference on High Performance Switching and Routing
This chapter first introduces several major approaches to solve the
This chapter first introduces several major approaches to solve the
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
Web Browsing Performance of
Available online at www.sciencedirect.com
Routing in Vehicular Ad Hoc
kasetsart journal of social sciences xxx (2016) 1e8
kasetsart journal of social sciences xxx (2016) 1e8
kasetsart journal of social sciences xxx (2016) 1e8
Network-Based Modeling and Intelligent Data
7
FEATURE
Optimized Node Selection Process for Quality of
guide to computer network security بﺎﺗﮐ زا هدﺎﻔﺗﺳا تﺳاوﺧرد
guide to computer network security بﺎﺗﮐ زا هدﺎﻔﺗﺳا تﺳاوﺧرد
1
A distribution planning model for natural gas supply chain
Telecommun Syst
Telecommun Syst
Shamsuzzoha and Helo
Shamsuzzoha and Helo
ensuring security for all communication links of a wireless sensor
2011 IEEE Symposium on Computers & Informatics
2011 IEEE Symposium on Computers & Informatics
Simulation Modelling Practice and Theory 38 (2013) 69–97
Simulation Modelling Practice and Theory 38 (2013) 69–97
Survey on context-aware publish/subscribe systems for
subscribe scheme is an efficient paradigm for communication widely used
Intelligent Traffic Information System Based on Integration of Internet of
Improving connectivity and power efficiency in wireless ad hocnetworks through
kasetsart journal of social sciences xxx (2016) 1e8
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
In order to solve the contradiction between the connectivity of
Available online at www.sciencedirect.com
CHAPTER 6
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
2013 Second European Workshop on Software Defined Networks
S systems for VANET The examples of the previous section
ARTICLE IN PRESS
2 Semantic Web The Web doubles in size every eight
2 Semantic Web The Web doubles in size every eight
1 Artificial Intelligence and Related Techniques Applied to Semantic Web
1 Artificial Intelligence and Related Techniques Applied to Semantic Web
2 Semantic Web The Web doubles in size every eight
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
Chapter 2
2013 Second European Workshop on Software Defined Networks
Journal of Petroleum Science and Engineering 92–93 (2012) 110–123
International Telecommunication Union
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of
Downloaded form http://iranpaper.ir
⎧
Figure 2.11 and Figure 2.12 illustrates an example of how circuit-switching flow
Malware Protection Malware on person computers takes the forms of
Downloaded form http://iranpaper.ir
network technologies and architectures are introduced and discussed along with
Computer Communications 35 (2012) 670–681
Big Data Research 3 (2016) 10–23
Big Data Research 3 (2016) 24–28
Big Data Research 3 (2016) 24–28
Based Modeling and Intelligent Data Mining of Social Media for
Based Modeling and Intelligent Data Mining of Social Media for
Network-Based Modeling and Intelligent Data
Based Modeling and Intelligent Data Mining of Social Media for
Network-Based Modeling and Intelligent Data
COMPNW 5320 No. of Pages 30, Model 3G
MorrisCh3.fm Page 77 Thursday, May 15, 2003 3:42 PM
or through a custom protocol that encodes the event subscription
1212 IEEETRANSACTIONSONPOWERSYSTEMS,VOL.29,NO.3,MAY2014
Available online at www.sciencedirect.com
ARTICLE IN PRESS
an improved version of the energy aware distributed unequal clustering
40
5
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI Downloaded form http://iranpaper.ir
Motivation
DATA CENTER
is an emerging paradigm to logically centralize the network control
Result Analysis
SDN-based Virtual Machine Management !
Expert Systems with Applications 39 (2012) 4160–4170
Downloaded form http://iranpaper.ir
Based Modeling and Intelligent Data Mining of Social Media for
2
and applications have much more in common than what separates
IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 497
1
ARTICLE IN PRESS
an energy balanced clustering algorithm based on leach protocolineering and Modeling (ICSEM-13)
Novell IPX Configuration Examples
These services are subscribed by clients willing to reduce the
Managing Supply Chain Knowledge in the New Product Development Process: a
Software-Defined Cloud Computing: Architectural
Accelerating Bitcoin’s Transaction Processing
Accelerating Bitcoin’s Transaction Processing
Clinical Neurophysiology xxx (2014) xxx–xxx
Clinical Neurophysiology xxx (2014) xxx–xxx
Clinical Neurophysiology xxx (2014) xxx–xxx
© 2003 IEEE. Reprinted, with permission, from Steve Ling, A novel genetic-algorithm-based neural network for
Novell IPX Configuration Examples
Technical Report Documentation Page
Computer Networks 81 (2015) 308–319
Horizon 2020 and Bey
1152 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007
Fundamentals of Telecommunications. Roger L. Freeman
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 6 0 2 9 7 8 6 3
M o b i l e P h o n e L o c a t i o n A r e a B a s e d T r a f f i c F l o w
PSEUDO-ELLIPTIC FILTERS 41
Multi-EvidenceLiftedMessagePassing,
قابلیت های امنیتی فایروال های juniper
ACCINF-00259; No of Pages 11
Integrating artificial neural networks and geostatistics for optimum 3D
MCDRR Packet Scheduling Algorithm
a b s t r a c t
Thisstudyaimstodevelopasafetyperformancemodelforroad regions. However, safety is a microscopic problem and the direct
2
55
55803
JID:BDR AID:32 /FLA [m5G; v1.168; Prn:26/11/2015; 15:54] P.1 (1-14)
International Journal of Future Generation Communication and Networking
Expert Systems with Applications 36 (2009) 7992–7999
A Survey on Wireless Sensor Network Security
Int. J. Production Economics 137 (2012) 165–175
Available online at www.sciencedirect.com
2
Open Source Security Information Management
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
584 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592 585
586 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592 587
Available online at www.sciencedirect.com
588 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
588 Vedran Podobnik and Ignac Lovrek / Procedia Computer Science 60 ( 2015 ) 583 – 592
Cisco
Test-Bronz
Test-Silver
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
T. Wang et al.: Rethinking the Data Center Networking
SCIENCE CHINA
Procedia Computer Science
REVIEW
Abstract Nowadays with an increasing approach in using diverse production
محصولات Linksys
networks Determining a complete mixing network requires knowledge of every
2.1 Sensor Technologies for Water Quality Monitoring
time by passively monitoring a network link over which the
International Journal of Engineering & Technology IJET-IJENS Vol: 11 No: 01 24
International Journal of Engineering & Technology IJET-IJENS Vol: 11 No: 01 24
1
ARTICLE IN PRESS
is a wireless communications services provider that does not own
the basic communication service is the transportation of the data
the basic communication service is the transportation of the data
Getting Started with
Instant Wireshark Starter
Computer Networks 53 (2009) 1354–1376
A survey of Attacks on VoIP networks and Countermeasures
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
MiningHeterogeneousInformationNetworks: AStructural
It helps prevent the restriction of a DAS connecting to
JOURNAL OF COMPUTATIONAL BIOLOGY
IEEE ICC 2015 - Workshop on Smart Communication Protocols and Algorithms (SCPA 2015)
2. Related work and original contributions
2. Related work and original contributions
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
HASHEM EIZAetal.: SITUATION-AWARE QoS ROUTING ALGORITHM FOR VANETs 5523
HASHEM EIZAetal.: SITUATION-AWARE QoS ROUTING ALGORITHM FOR VANETs 5523
SCHILLER
SCHILLER
SCHILLER
SCHILLER
Interbank tiering and money center banks Ben Craig_ Goetz von
Sensor Placement in Municipal Water Networkswith Temporal Integer Programming Models
2 Outbreak Detection
value interbank payment flows in theUnited Kingdom so as to
value interbank payment flows in theUnited Kingdom so as to
1
Influence Maximization on Multi-Phased Multi-Layered Network
PHYSICAL REVIEW X 3, 041022 (2013)
Embedded Systems
4 Easy Steps to Increase Sales Through LinkedIn
The Entrepreneur's Tactical Guide to Building a Billion-Dollar Network
ABSTRACT
ABSTRACT
ffirs.indd ffirs.indd ii ii 4/19/2012 4/19/2012 12:13:26 PM 12:13:26 PM Information Storage and
15767 (6) - DanwareNetOp Host HELO Request Remote Information Disclosure
From the Proceedings of the 2000 International Conference on Supercomputing, Santa Fe, N.M., May, 2000.
From the Proceedings of the 2000 International Conference on Supercomputing, Santa Fe, N.M., May, 2000.
JOURNALOFCOMMUNICATIONSANDNETWORKS,VOL.17,NO.6,DECEMBER2015 549
JOURNALOFCOMMUNICATIONSANDNETWORKS,VOL.17,NO.6,DECEMBER2015 549
ND
2
Extracting Social Networks Among Various Entities
از مسائل پیش روی شرکت های خرد می توان کمبود
59653
4 Receiver Sensitivity The noise in the original input Ni
our contribution is to determine whether EON network is cost
Downloaded from http://iranpaper.ir
00:00:00
ARTICLE IN PRESS
2.8 Associative learning process for memory construction
2.8 Associative learning process for memory construction
2.8 Associative learning process for memory construction
2.8 Associative learning process for memory construction
ARTICLE IN PRESS
ARTICLE IN PRESS
A First Course in
(IJACSA) International Journal of Advanced Computer Science and Applications,
ARTICLE IN PRESS
Data Sheet
JPMA-01723; No of Pages 13
JPMA-01723; No of Pages 13
High-Density Distributed
European Journal of Operational Research 255 (2016) 935–947
European Journal of Operational Research 255 (2016) 935–947
European Journal of Operational Research 255 (2016) 935–947
Distributed Database Management Techniques
Distributed Database Management Techniques
Distributed Database Management Techniques
Distributed Database Management Techniques
COMPNW 5391 No. of Pages 18, Model 3G
COMPNW 5391 No. of Pages 18, Model 3G
Downloaded from http://iranpaper.ir
AN IMPROVED LEADER ELECTION ALGORITHM FOR DISTRIBUTED SYSTEMS ABSTRACT Leader
Artificial Neural Network Travel Time Prediction Model for Buses Using Only GPS Data
ARTICLE IN PRESS
Computer Networks 104 (2016) 55–65
JournalofSubstanceAbuseTreatment70(2016)87–92
star network topology to enhance the system capacity abstract In
Accepted Manuscript
The Journal of China
Geographic Load Balancing Routing in Hybrid
star network topology to enhance the system capacityIn this
But if you must use the free wireless at your
JournalofSubstanceAbuseTreatment70(2016)87–92
star network topology to enhance the system capacity In this
Available online at www.sciencedirect.com
1 Authors name
Journal of Systems Architecture 60 (2014) 726–740
The ontological knowledge consists of the known existing relationships among
Cross-Domain Situational Awareness and
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
HOSTED BY
Available online at www.sciencedirect.com
is a communication mobile networkdesigned to fulfill specific communication needs
Downloaded from http://iranpaper.ir
JournalofSubstanceAbuseTreatment70(2016)87–92
Load balancing and deadline management of queues in an OpenFlow
Artificial Neural Networks for Misuse Detection
JournalofSubstanceAbuseTreatment70(2016)87–92
28
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 1, JANUARY 2014 ISSN 2277-8616
ARTICLE IN PRESS
Signals and Communication Technology
J. of Supercritical Fluids 69 (2012) 91– 96
ISSN 2409-26 65
Application of artificial neural network in predicting the extraction yield
Link Prediction in Multi-modal Social Networks
Encyclopedia of Social Network Analysis and Mining, Springer 2013
HowInformationTechnologySupportsCommunicationandCollaboration 105
2009 International Conference on Computational Science and Engineering 2009 International
Neural Comput & Applic
journal of information security and applications xxx (2014) 1e10
2534 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 22, NO. 4, OCTOBER 2007
2534 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 22, NO. 4, OCTOBER 2007
2534 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 22, NO. 4, OCTOBER 2007
2009 International Conference on Computational Science and Engineering 2009 International
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
2009 International Conference on Computational Science and Engineering 2009 International
Design and Evaluation of Learning Algorithms for
5.3 Power System Observation and Intelligent Congestion Management 211
Available online at www.sciencedirect.com
آموزشها و برنامه های محدودی برای به اشتراک گذاشتن اینترنت
Journal of Advanced Management Science Vol. 1, No. 3, September 2013
Brain connectivity can be investigated by looking at similarity of
Open
ThesmartpowergridisanativeapplicationofIoTand Cloud technologiesastheintelligentmeters arehighly distributed andthey generate huge amount of
Brain connectivity can be investigated by looking at similarity of
Available online at www.sciencedirect.com
Abstract Wireless Networks are becoming popular due to the concept
Available online at www.sciencedirect.com
The current issue and full text archive of this journal is available at
CORONET: Fault Tolerance for Software Defined
CORONET: Fault Tolerance for Software Defined
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Optimal Distribution system feeder reconfiguration and distributed generation
Available online at www.sciencedirect.com
Fault Tolerant SDN Controller: A Survey
Fault Tolerant SDN Controller: A Survey
Neural Comput & Applic
International Journal of Sociology and Social Policy
time employed in jobs that generate incomes below the subsistence
Neural Comput & Applic
Z39.50 An Information Retrieval Protocol for Libraries
Wireless Netw
time employed in jobs that generate incomes below the subsistence
Neural Comput & Applic
PROVIDING END-TO-END QOS IN 4G NETWORKS
time employed in jobs that generate incomes below the subsistence
ARTICLE 385
ARTICLE 385
2
Computer Communications 96 (2016) 1–16
Application of artificial neural network in predicting the extraction yield
Neurocomputing ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Neural Comput & Applic
Available online at www.sciencedirect.com
journal of information security and applications xxx (2014) 1e10
Do I Need a Server?
ANT-COLONY OPTIMIZATION BASED IN-NETWORK DATA AGGREGATION IN
International Journal of Security and Its Applications
Imprint logo
Neural Comput & Applic
Downloaded from http://iranpaper.ir
Experiments and resultsIn order to analyze and understand the
manet spanning tree
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 3, ISSUE 07 87
Management interfaces reside at various levels in the software stack
Chapter 5 Communicating Between and Among Internal Stakeholders
Our study started with the observation that metropolitan areas are
Chapter 5 Communicating Between and Among Internal Stakeholders
The current issue and full text archive of this journal is available at
EuropeanJournal ofOperational Research250 (2016)239–250
NETWORK TRAFFIC ANOMALY DETECTION FOR IAAS
yet they present a serious threat due to rogue malicious
yet they present a serious threat due to rogue malicious
Expert Systems with Applications 42 (2015) 3852–3867
VERSION 2.01 1
IEEECOMMUNICATION SURVEYS &TUTORIALS,VOL.17,NO.1,FIRSTQUARTER2015 27
Virtual machine migration makes system deployment fast and easy by
The chances are pretty good that you have a wireless
REVIEWS
collaborative Protection Profile for Network Devices
Exploring Large-Scale Peer-to-Peer Live Streaming
Conditional Random Fields as Recurrent Neural Networks
Calhoun: The NPS Institutional Archive
Chapter 12
at’s studies, the authors reconfigure the place of public libraries, scriptions to journals and the use of Internet-delivered ab-
International Journal of Smart Home
Threats Analysis, Requirements and Considerations for Secure Internet of Things
Journal of Network and Computer Applications xx (xxxx) xxxx–xxxx
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Calhoun: The NPS Institutional Archive
with a central mainframe supporting a number of directly connected
with a central mainframe supporting a number of directly connected
Renewable and Sustainable Energy Reviews 66 (2016) 499–516
Journal of Network and Computer Applications xx (xxxx) xxxx–xxxx
Journal of Network and Computer Applications xx (xxxx) xxxx–xxxx
Journal of Network and Computer Applications xx (xxxx) xxxx–xxxx
Journal of Network and Computer Applications xx (xxxx) xxxx–xxxx
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 15, NO. 2, APRIL 2014 477
Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 – 08 March, 2014
we presented a novel methodology for selecting nodes to detect
with a central mainframe supporting a number of directly connected
SECURITY
2015 11th International Conference on Mobile Ad-hoc and Sensor Networks
Master thesis
A Survey of Trust in Social Networks
Journal of Network and Computer Applications 66 (2016) 198–213
Detecting Anomalies in Online Social Networks using Graph Metrics Abstract
Downloaded from http://comjnl.oxfordjournals.org/ at Northeastern University Libraries on October 10, 2014
the width of the input MOS device can be chosen
Remote reads are read directly from memory into the network
Received February 16, 2016, accepted March 31, 2016, date of publication April 20, 2016, date of current version May 9, 2016.
Received February 16, 2016, accepted March 31, 2016, date of publication April 20, 2016, date of current version May 9, 2016.
A live wireless local area network had been setup for
Abstrack Network traffic monitoring and analysis is of theoretical and practical significance for optimizing network resource and improving user experience.
Computer Networks 55 (2011) 386–398
A live wireless local area network had been setup for
Data Management and ImplementationPing LiuComputer and Information Engineering
Computers and Electrical Engineering xxx (2015) xxx–xxx
M. Jaber et al.: 5G Backhaul Challenges and Emerging Research Directions
M. Jaber et al.: 5G Backhaul Challenges and Emerging Research Directions
Computers and Electrical Engineering xxx (2015) xxx–xxx
Computers and Electrical Engineering xxx (2015) xxx–xxx
Accepted Manuscript
Introduction Firewall Planning and Design Processes
IoT Standards and Protocols An overview of protocols involved in
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2016.2561303, IEEE
International Journal of Security and Its Applications
International Journal of Security and Its Applications
and Strategic Networks Learning Objectives See networks as something you
49th IEEE Conference on Decision and Control
Brigham Young University
accept that networking is one of the most important requirements
a strategic network necessarily involves lateral and vertical ties to
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
All managers need to build good working relationships with the
are also individuals who are likely to be outside of
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
Named Data Networking for IoT:
Electrical Power and Energy Systems 26 (2004) 199–205
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
International Journal of Security and Its Applications
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
kindred spirits outside your organization who can help you with
a strategic network necessarily involves lateral and vertical ties to
1
Community structure in social and
1
1
ONLINE PRIVACY ISSUES The online privacy issue encompasses topics such
Origin of the term The origin of the term cloud
1
Named Data Networking for IoT:
An efficient algorithm for community mining with overlap in socialnetworks
2016 IEEE First International Conference on Internet-of-Things Design and Implementation
Ad Hoc Networks 56 (2017) 122–140
KEYWORDS
Ad Hoc Networks 56 (2017) 122–140
Network Reliability: Theory, Estimation, and Applications
Network Reliability: Theory, Estimation, and Applications
Bargaining Models for Optimal Design of Water Distribution Networks This
20 Social Networking Sites for Business Professionals By Amber Leigh
20 Social Networking Sites for Business Professionals By Amber Leigh
20 Social Networking Sites for Business Professionals By Amber Leigh
20 Social Networking Sites for Business Professionals By Amber Leigh
Light Fidelity (Li-Fi): Towards All-Optical Networking
Available online at www.sciencedirect.com
International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012
Light Fidelity (Li-Fi): Towards All-Optical Networking
journal of information security and applications 24-25 (2015) 25–40
International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012
Wireless Netw
Wireless Netw
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Expert Systems With Applications 71 (2017) 138–146
Expert Systems With Applications 71 (2017) 138–146
Available online at www.sciencedirect.com
IET Generation, Transmission & Distribution
Fortiweb and FortiAnalyzer Devices
SNNAP: Approximate Computing
Most traffic in sensor networks canbe classified into one of
BUSHOR-1363; No. of Pages 11
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
A social network is a social structure made up of a set of social actors (such as
Available online at www.sciencedirect.com
related illnesses and conditions and so become increasingly vulnerable to
M. Kapsali / Technovation 31 (2011) 615–626 621
A Routing and Spectrum Assignment Problem
Foreword Over the past 20 years enormous progress has been
The effect of road network patterns on pedestrian safety: A
M. Kapsali / Technovation 31 (2011) 615–626 621
M. Kapsali / Technovation 31 (2011) 615–626 621
encouragedseveral countries to establish or to update their national AR
The current issue and full text archive of this journal is available at
Advanced Information and Knowledge Processing
IBIMA Publishing
Research in Organizational Behavior 35 (2015) 29–56
ARTICLE IN PRESS
ARTICLE 385
Journal of Network and Computer Applications 36 (2013) 16–24
SDN and Fog Computing Rapid increase in number and diversity
SDN and Fog Computing Rapid increase in number and diversity
Electric Power Systems Research 143 (2017) 643–656
Communicated by Prof. Duan Shukai
Electric Power Systems Research 143 (2017) 643–656
XBF: Scaling up Bloom-filter-based Source Routing
106 G. Carofiglio et al. / Computer Networks 110 (2016) 104–117
A new measure of heterogeneity for complex networks
IX: A Protected Dataplane Operating System for
International Journal of Security and Networks 2016 Vol. 11 No. 4 1 Title: Secure mobile agent-based English auction protocol using identity-based signature scheme Author: AbubakerWahaballa; HuXiong; Fagen Li; Zhen Qin; Zhiguang Qin Addresses:
s behalf even when the user is disconnected from the
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
computers & security 37 (2013) 1e14
1032A
1032B
Computer Networks 57 (2013) 1344–1371
The application of median indicator kriging and neural network in modeling
Renewable and Sustainable Energy Reviews 66 (2016) 499–516
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
s behalf even when the user is disconnected from the
Chapter6
TFS-18365;NoofPages10
s behalf even when the user is disconnected from the
Computers & Industrial Engineering 93 (2016) 205–214
STRUCTURAL DAMAGE DETECTION USING ARTIFICIAL
MobileNetwAppl
MobileNetwAppl
Downloaded from http://iranpaper.ir
- Earth Fault Detection : Basics in Theory job.no. TE-00-101 -
2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC)
ASurveyonSecurityinD2DCommunications
WHITE PAPER
1. Over time, Ethernet evolved to support switches, routers, and multiple link
Background and related work This research focuses on the cloud
www.ketabdownload.com www.ketabdownload.com
2016 8th International Conference on Communication Systems and Networks (COMSNETS)
2016 8th International Conference on Communication Systems and Networks (COMSNETS)
Available online at www.sciencedirect.com
Engineering Applications of Artificial Intelligence 58 (2017) 111–122
Available online at www.sciencedirect.com
Accepted Manuscript
Available online at www.sciencedirect.com
computers & security 37 (2013) 1e14
WANG1_LAYOUT.qxp_Layout 1 3/13/15 1:56 PM Page 6
WANG1_LAYOUT.qxp_Layout 1 3/13/15 1:56 PM Page 6
WANG1_LAYOUT.qxp_Layout 1 3/13/15 1:56 PM Page 6
ADHOC 851 No. of Pages 17, Model 3G
Available online at www.sciencedirect.com
JOURNAL OF INTERNET ENGINEERING, VOL. 5, NO. 1, JUNE 2012 331
2013 IEEE Military Communications Conference 2013 IEEE Military Communications Conference
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 61, NO. 4, NOVEMBER 2014 599
http://tarjomebazar.com
40th IEEE/ACM International Symposium on Microarchitecture 40th IEEE/ACM International Symposium on Microarchitecture 40th IEEE/ACM International Symposium on Microarchitecture
Chapter
فیبر نوری
http://tarjomebazar.com
http://tarjomebazar.com
ARTICLE IN PRESS
computers & security 37 (2013) 1e14
New Technologies for Electric Power Distribution Systems 158
New Technologies for Electric Power Distribution Systems 158
New Technologies for Electric Power Distribution Systems 158
An Adaptive Probabilistic Scheduler for Offloading
computers & security 37 (2013) 1e14
COMPUTER SCIENCE REVIEW ( ) –
forward neural networkwith a single layer of neurons arranged into
Configuration
Configuration
Computer Communications 74 (2016) 3–15
http://tarjomebazar.com
middleware is an important enabler which provide communication among heterogeneous
New Model for IT:
Proceedings of IEEE CCIS2012
Proceedings of IEEE CCIS2012
Downloaded from http://iranpaper.ir
Interested in learning
Wirele SS
Sensors 2015, 15, 28603-28626; doi:10.3390/s151128603
Simulation Modelling Practice and Theory 73 (2017) 43–54
FEAMSTER LAYOUT_Layout 1 1/28/13 3:36 PM Page 114
2015 Intl. Conference on Computing and Network Communications (CoCoNet'15), Dec. 16-19, 2015, Trivandrum, India
Calhoun: The NPS Institutional Archive
Calhoun: The NPS Institutional Archive
COMPUTER SCIENCE REVIEW 7 (2013) 1–34
معرفی محصولات شرکت فورتی نت
Human Resource Management
Journal of Natural Gas Science and Engineering 21 (2014) 221e229
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Chapter 1
2015 Intl. Conference on Computing and Network Communications (CoCoNet'15), Dec. 16-19, 2015, Trivandrum, India
Sensors 2015, 15, 28603-28626; doi:10.3390/s151128603
community detection
3System breakdown and analysis We split the proposed architecture for
ComputerNetworks38(2002)393–422
World Academy of Science, Engineering and Technology
Abstract Network lifetime improvement and uncertainty inmultiple systems are the
Industrial Marketing Management 33 (2004) 465–473
Production Planning & c ontrol, 2017
Production Planning & c ontrol, 2017
Fault-Tolerance in the Network Storage Stack
Sensors 2015, 15, 28603-28626; doi:10.3390/s151128603
Bayesian Image Quality Transfer with CNNs:
Bayesian Image Quality Transfer with CNNs:
Downloaded from http://iranpaper.ir
World Academy of Science, Engineering and Technology
World Academy of Science, Engineering and Technology
4th IFAC Symposium on Telematics Applications
T echnical P aper
Preprint: http://arxiv.org/abs/1307.2661
SDN-based Game-Aware Network Management
An SDN Controller for Delay and Jitter Reduction in Cloud
An SDN Controller for Delay and Jitter Reduction in Cloud
DTN routing Traditional routing assumes that protocols somehow manage to
secures organizations with its wide range of product offerings at
FortiWeb Unprotected web applications are the easiest point of entry
Chapter 1
LBRR: Load Balanced Ring Routing Protocol for
Regularization of Neural Networks using DropConnect
Regularization of Neural Networks using DropConnect
1
Blood supply chain network design considering blood group compatibility under
Blood supply chain network design considering blood group compatibility under
®
An energy efficient approach for data collection in wireless sensornetworks
An energy efficient approach for data collection in wireless sensornetworks
Unicast Routing The Bundle protocol does not define any method
Unicast Routing The Bundle protocol does not define any method
system can beshared among severalsmaller individual control agents, behavinglike a small
trends of cloud computingand the mobile Internet are massively expanding
One of the potential reasons for the growth isIoT technologies
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
JOURNAL OF COMMUNICATIONS AND INFORMATION SYSTEMS, VOL. 1, NO. 27, APRIL 2012 15
Shancang Li is a Senior Lecturer in Department of Computer
Exam Ref
notification and recording procedures for frequency assignments pertaining to satellite
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
2 Beta Network 4 Miscellaneous considerations 5 Optimization and performance
2 Beta Network 4 Miscellaneous considerations 5 Optimization and performance
notification and recording procedures for frequency assignments pertaining to satellite
organizations cannot afford to choose between security and maintaining a
SO42-FrontMatter ARI 8 July 2016 13:43
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Chapter Scanning Networks
An Optimization Tool for Water Network Expansion Planning A water
Engineering Science and Technology, an International Journal 19 (2016) 1050–1058
A Survey of Trust in Social Networks
Transportation Research Part E 103 (2017) 109–142
Accepted Manuscript
Waste Management xxx (2016) xxx–xxx
2016 International Conference on Networking and Network Applications 2016 International Conference on Networking and Network Applications
2016 International Conference on Networking and Network Applications 2016 International Conference on Networking and Network Applications
FortiGuard Security Subscriptions New cyber threats emerge every moment of
J Digit Imaging(2017) 30:400–405
Optical Switching and Networking 14 (2014) 179–193
Optical Switching and Networking 14 (2014) 179–193
JOURNAL OF NETWORKS, VOL. 5, NO. 4, APRIL 2010 393
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence
C o m m u n i t y D e t e c t i o n i n C o m p l e x N e t w o r k s U s i n g
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence
Community Detection in Complex Networks using Genetic Algorithm
Related content
cial Neural Network for the Differentiation of Clinically Atypical Pigmented
Community detection in complex networks
Community detection in complex networks
Community detection in complex networks
Renewable and Sustainable Energy Reviews 68 (2017) 221–233
Renewable and Sustainable Energy Reviews 68 (2017) 221–233
OverlappingCommunityDetectionatScale:
3. EMPIRICAL OBSERVATION
Downloaded from http://iranpaper.ir
A Survey Recent technological advances in the area of wireless
Applied Energy 146 (2015) 122–134
term district heat demand forecast Abstract District heating networks are
Electric load forecasting by using dynamic neural
Electrical Power and Energy Systems 64 (2015) 671–678
Networking Fundamentals
Multi-agent Systems Applied for Restoration of
Reliable Data Dissemination Protocol for VANET TrafÞc Safety Applications
1238 IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 64, NO. 6, JUNE 2017
Distributed argumentative model for Group Decision Making processes Up to
Available online at www.sciencedirect.com
and How to Fix It Technologies such as VoLTE and
a b s t r a c t Botnet is
Computers in Human Behavior 56 (2016) 295e305
Computers in Human Behavior 56 (2016) 295e305
Ad Hoc Networks 9 (2011) 1238–1255
1
Energy Efficient Routing in Wireless Sensor
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Paper—Design and Realization of Greenhouse Sensor Intelligent Management System Based on Internet…
International Conference on Computer Science and Electronic Technology (CSET 2016)
Designing and Implementing
Paper—Design and Realization of Greenhouse Sensor Intelligent Management System Based on Internet…
vxlan
Wireless Netw
NMap is a free and open source utility that mainly performs IP scans, port
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
5520 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 64, NO. 12, DECEMBER 2015
Peer-to-Peer Netw. Appl.
10.2 IoT SECURITY OVERVIEW 189
CHAPTER
Applied Soft Computing 63 (2018) 59–70
Applied Soft Computing 63 (2018) 59–70
Cluster Comput
Pacific Science Review A: Natural Science and Engineering 18 (2016) 222e227
GPSR: Greedy Perimeter Stateless Routing for Wireless
Predictive Applications Perhaps the most exciting use for Smart Services
Predictive Applications Perhaps the most exciting use for Smart Services
Information Fusion 42 (2018) 146–157
J. Mod. Power Syst. Clean Energy (2014) 2(2):181–190
Information Fusion 42 (2018) 146–157
IOT SECURITY 1
Towards the Implementation of IoT for Environmental Condition Monitoring in
OPEN Detecting Communities Based on
how you can get it and how it can help
Ab s t r a c t
Ab s t r a c t
Ab s t r a c t
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
212 M.M. Afsar, M.-H. Tayarani-N / Journal of Network and Computer Applications 46 (2014) 198–226
node
About Sophos Company Sophos Group plc is a British security
IOT SECURITY 1
Ab s t r a c t
Ab s t r a c t
The concept of network reliability has been extensively studied under
Suman Deb Roy · Wenjun Zeng
Payment Card Industry (PCI)
Payment Card Industry (PCI)
Payment Card Industry (PCI)
2017 9th IEEE International Conference on Communication Software and Networks
ارائه ی مسیریابی و کیفیت سرویس در شبکه نرم افزار محور
Ab s t r a c t
Investigating The Relationship between leadership style and
Accepted Manuscript
~Security ®
Investigating The Relationship between leadership style and
Interpenetrating
1
Evaluation of the Voltage Support Strategies for the Low Voltage Grid Connected PV
Downloaded from http://iranpaper.ir
MicroSCADA Pro
UNBOXED - GET PAID TO POST AND ENGAGE
Modeling slump of ready mix concrete using genetic algorithms assisted
کامپیوتر
Network Anomaly Detection
Network Anomaly Detection
MatConvNet
Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication
Engineering Applications of Artificial Intelligence 46 (2015) 23–32
May 2015, Volume 2, Issue 5 JETIR (ISSN-2349-5162)
Applied Soft Computing 58 (2017) 1–10
Applied Soft Computing 58 (2017) 1–10
Applied Soft Computing 58 (2017) 1–10
Accepted Manuscript
Journal of Network and Computer Applications 88 (2017) 10–28
1
2524 IEEE COMMUNICATIONS LETTERS, VOL. 21, NO. 11, NOVEMBER 2017
UNSW-NB15: A Comprehensive Data set for Network
ACCEPTED MANUSCRIPT
ARTICLE IN PRESS
ARTICLE IN PRESS
1
3
4
3
4
Jill Slay School of Engineering and Information Technology University of
Accepted Manuscript
Computers & Industrial Engineering 64 (2013) 1096–1109
Large-scale model of mammalian
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 4 (2016) pp 2411-2416
J Sign Process Syst
1984-2014
Hare Hilton in hopes of establishing networking capabilities to advance
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2016.2550765, IEEE
Environmental Modelling & Software 25 (2010) 891e909
OpenNetMon: Network Monitoring in OpenFlow
Soft Comput
Detecting redirection spam using multilayer perceptron neuralnetworkAbstract Quality
IoTSecurity: Review,BlockchainSolutions,andOpenChallenges
Cluster Comput
civil society and citizens to tackle complex policy challenges through
Cluster Comput
Neurocomputing 275 (2018) 278–287
This article has been accepted for publication in IEEE Computer magazine.
This article has been accepted for publication in IEEE Computer magazine.
Trans. Tianjin Univ. 2009, 15: 245-248
Downloaded from http://iranpaper.ir
International Journal of Disaster Risk Reduction 27 (2018) 7–20
International Journal of Disaster Risk Reduction 27 (2018) 7–20
Downloaded from http://paperhub.ir
NeuralTuringMachines
International Journal of Disaster Risk Reduction 27 (2018) 7–20
offering the opportunity tononinvasively visualize different retinal capillary layers without
146 Visible Light Communications
1
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JLT.2015.2510021, Journal of
2018 IEEE Conference on Multimedia Information Processing and Retrieval
learned feature extraction There are many existing deeper and wider
Expert Systems With Applications 115 (2019) 200–222
202 S.M.H. Bamakan et al. / Expert Systems With Applications 115 (2019) 200–222
5G Mobile and Wireless Communications Technology
Multi-Net: ScalableMultilayerNetworkEmbeddings
9
امنیت شبکه
Host-Based versus Network-Based
Cross-Site Virtual
Int. J. Communications, Network and System Sciences, 2013, 6, 443-450
Int. J. Communications, Network and System Sciences, 2013, 6, 443-450
An Introduction to Digital Mobile Radio
Journal of Information Security and Applications 35 (2017) 128–137
G Model
G Model
Available online at www.sciencedirect.com
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
sensors
Available online at www.sciencedirect.com
Computers and Electrical Engineering 67 (2018) 96–113
Accepted Manuscript
A Clustering Routing Protocol for Energy Balance of Wireless
A Clustering Routing Protocol for Energy Balance of Wireless
ATM Management: Challenges and Solutions for the
ATM Management: Challenges and Solutions for the
Y.-H. Hung et al./Knowledge-Based Systems 35 (2012) 87–93 89
Available online at www.sciencedirect.com
DiscoveringLatentNetworkStructureinPointProcessData
Accepted Manuscript
International Conference on Electronics, Communication and Aerospace Technology
2017 ACM/IEEE Symposium on Architectures for Networking and Communications 2017 ACM/IEEE Symposium on Architectures for Networking and Communications 2017 ACM/IEEE Symposium on Architectures for Networking and Communications
(a) Average large flow completion time (b) Large flow relative recovery
flow completion times increase by 95–251% and average small flow bandwidth for common datacenter workloads. Albedo also provides
Sohps XG Firewall
Sinks Mobility Strategy in IPv6-based WSNs for
Sinks Mobility Strategy in IPv6-based WSNs for
infrastructures, ranging from the distribution and
Blood supply chain network design under uncertainties in supply and
Commercialization is known to be a critical stage of the
2019 IEEE 5th International Conference on Knowledge-Based Engineering and Innovation (KBEI)
Received September 1, 2017, accepted October 8, 2017, date of publication October 11, 2017, date of current version February 1, 2018.
Page �1 of �47
2856 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 5, MAY 2014
A COMPARISON OF FOG COMPUTING ANDRELATED COMPUTING PARADIGMS This section
fog computing is a distributed computingarchitecture that involves network related
1
1
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Whale Optimization Algorithm for Routing in Internet of Things to
JKnowlEcon
Accepted Manuscript
Fog Data Analytics: A Taxonomy and Process Model Abstract
Accepted Manuscript
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
(IJACSA) International Journal of Advanced Computer Science and Applications,
1
Neurocomputing 284 (2018) 1–9
Neurocomputing 284 (2018) 1–9
HindawiPublishingCorporation
sensors
Design This paper presents two optimization techniques for Linux specifically
The electric power industry in the United States and in
570 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
2 J. Windsperger et al.
Networks and Their Goals: Implications
2 Theoretical framework
66 2 Theoretical framework
2 J. Windsperger et al.
Networks and Their Goals: Implications
2 Theoretical framework
66 2 Theoretical framework
Applying the BIAN Standard in
this ransomware targets the Pokemon Go application for Windows and
GEO-MODSIM: SPATIAL DECISION SUPPORT SYSTEM FOR
1. Socio - economic drivers of Energy at the horizon 2020
correlation forecasting by stochastic time strength neural network in financial
com New study reveals why some people are more creative
The Life Cycle of Cluster in Recent Literature As already
Journal of Network and Computer Applications 35 (2012) 619–632
Journal of Network and Computer Applications 35 (2012) 619–632
Journal of Network and Computer Applications 35 (2012) 619–632
26 Flower pollination algorithm based multi-objective congestion management considering
Verification line
ptg17396363
®
www.nature.com/npjqi
University of Southampton Research Repository
5004
5004-1
5004-3
53-67
Using blockchains to enable Big Data analysis of
not only the digital world but alsoour everyday lives and
not only the digital world but alsoour everyday lives and
The popularity of Blockchain technology and thehuge extent of its
Research Issues and Challenges in Content Placementand Delivery Strategies Abstract
Computers & Industrial Engineering 122 (2018) 95–105
P1: EHE/PCY P2: VTL/SFI P3: VTL/SFI QC:
JournalofNetworkandComputerApplications128(2019)90–104
JournalofNetworkandComputerApplications128(2019)90–104
Web-Scale Workflow
ترجمه مقدمه مقاله ریاضی کاربردی با عنوان Designing a two-echelon distribution network under demand uncertainty
ترجمه چکیده مقاله Designing a two-echelon distribution network under demand uncertainty
Abstract This paper proposes a comprehensive methodology for the stochastic
November 29, 2019 Distributed Systems
November 29, 2019 Distributed Systems
Energy Conversion and Management 49 (2008) 3017–3024
4in order to determine the handling of a subscriber initiated
AcceptedManuscript
demand economy has tremendously affected the distribution schemas of several
demand economy has tremendously affected the distribution schemas of several
Internet of Things 1–2 (2018) 1–13
worth of air time to broadcast a Share Our Strength
Case
DHS Science and Technology Directorate
DHS Science and Technology Directorate
DHS Science and Technology Directorate
SIEM Advanced ICS Threat Detection
Complex&IntelligentSystems
Complex&IntelligentSystems
A Survey of Security Tools for the Industrial Control System Environment
BATTLE-TESTED INDUSTRIAL CYBERSECURITY
BATTLE-TESTED INDUSTRIAL CYBERSECURITY
generation firewalls filter network traffic to protect an organization from
پایش امنیت سیستم های کنترل صنعتی
ETHERNET SWITCH VULNERABILITY MAC flooding is an attack that manipulates
The ability to access the raw packets on a network
with the consent of those in charge of the network
with the consent of those in charge of the network
has been made available to the sniffing host using the
profit United States computer networking consortium led by members from
profit United States computer networking consortium led by members from
InternetofThings InternetofThings
7
SPECIALSECTIONONHUMAN-CENTEREDSMARTSYSTEMSANDTECHNOLOGIES
Annals of Nuclear Energy 29 (2002) 41–51
many organizations are beginning to build their own storage system
The goal of a DMZ is to add an extra
What Is a Patch Panel and Why Do We Need
What Is a Patch Panel and Why Do We Need
what they mean and how they are relevant to network
lack of visibility continues to extend breach and compromise events
DHCP defined and how it works Dynamic host configuration protocol
Types of Network Topology Network Topology is the schematic description
Hossein Karimisharif
NAT translates the IP addresses of computers in a local
Complete Guide to FortiGate Firewall As a key component of
Dissertation der
re getting the most from your technology investments and provide
How to Benefit from a Layered Security Approach with Fortinet
Business critical applications are being run over multiple cloud environments
Business critical applications are being run over multiple cloud environments
Computer Network Types A computer network is a group of
Computer Network Architecture Computer Network Architecture is defined as the
Features Of Computer network A list Of Computer network features
Journal Pre-proof
Abstract Vaccination has been proven to be the most effective
5.8 LIST OF 5G AND GENERIC THREATS
Unauthorised activities/network intrusions
- Legal - Business applications
These threats relate to elements of the Core Network thatincludes
This threat relates to availability issues anddisclosure of sensitive data
This threat arises when an attacker scans the physical memory
Audittools are used by MNOs to monitor the activity of
Thisthreatrelatestocellularpagingprotocolsthatcanbeexploitedbya malicious actor in the vicinity of a victim to
This threat relatesto the exploitation of specific vulnerabilities of Data
DoS is a threat categorised under Nefarious Activity and Abuse
Article
Article
Proceedings of the 2008 Winter Simulation Conference
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
انتقال داده Software Architecture Solution Based on SDN for an
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2672680, IEEE Access
Analysis of OnlineSocial Network Connections for
Accepted Manuscript
Abstract
BSI Security Testing video
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPAMI.2016.2636828, IEEE
A novel robust fuzzy mean-UPM model for green closed-loop supply chain network design under distribution ambiguity
Downloaded from https://iranpaper.ir
ترجمه قسمت هایی از یک مقاله مربوط به رشته ریاضی کاربردی
demand economy has tremendously affected the distribution schemas of several
Chap4-30-45 21/06/02 9:57 Page 30
Computer Communications 139 (2019) 32–57
Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020)
2014 IEEE World Forum on Internet of Things (WF-IoT)
Computer Communications 139 (2019) 32–57
Health System Based on CloudComputing to Monitor the Vital Signs
applied
Downloaded from https://iranpaper.ir
the authors investigate the innovative concept of a dense wireless
wireless sensor networks are developing rapidly with the support of
1
3
Pitkänen P.(2019) Automaticimage qualityenhancement usingdeep neuralnet-
INTRODUCTION
How to Implement a Zero Trust Security Strategy How Does
How to Implement a Zero Trust Security Strategy How Does
Securing the edge with Zero Trust The proliferation of cloud
Red Team Operating in a
the attacker sends a decryption key to restore access to
Received: 30 June 2020 Revised: 6 August 2020 Accepted: 31 August 2020
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
Computer Networks 197 (2021) 108327
is data forwarding technology that increases the speed and controls
On OCT Image Classification via Deep Learning
These advanced firewalls cover the gamut of traditional firewall services
Ad Hoc Networks 124 (2022) 102721
Hi,
Received September 21, 2019, accepted October 15, 2019, date of publication November 1, 2019,
Ad Hoc Networks 124 (2022) 102721
11 A B S T R A C T In
11 A B S T R A C T In
is the process of restricting unauthorized users and devices from
Choosing the best ports for your networking device is vital
Sequential Deformation for Accurate Scene Text
This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.
BOTNET ATTACK IN COMPUTER NETWORK SECURITY
A network switch is an invaluable tool in many businesses
A Blockchain-Based Smart Network for IoT-Driven Smart
Journal of trends in Computer Science and Smart technology (TCSST) (2020)
computers
EBOOK EXTRAS: v1.0
Figure 22: In AirPort Utility for Mac, the Wireless Clients entry
Figure 22: In AirPort Utility for Mac, the Wireless Clients entry
Figure 22: In AirPort Utility for Mac, the Wireless Clients entry
Computers and Electrical Engineering 39 (2013) 2197–2206
Social Network Analysis and Mining (2021) 11:11
FutureGenerationComputerSystems128(2022)36–44
FutureGenerationComputerSystems128(2022)36–44
FutureGenerationComputerSystems128(2022)36–44
ی صصخت همجرت
ی صصخت همجرت
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/324936022
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/324936022
Part I: General Network Design
Part I: General Network Design
For more information on how to use the phone, please go to tcl.com and download the complete user
Connect the lights to the auxiliary box with the Network cable.
Connect the lights to the auxiliary box with the Network cable.
5200W PMPO
Expert Systems With Applications 139 (2020) 112839
2nd Reading
Hindawi
Journal Pre-proofs
Expert Systems With Applications 177 (2021) 114973
Article
electronics
Expert Systems With Applications 139 (2020) 112839
Hindawi
Journal Pre-proofs
BIRMINGHAM—MUMBAI
Designing an ecologically optimized road corridor surrounding restricted urban areas: A mathematical methodology
Available online at www.sciencedirect.com
Received 11 June 2022, accepted 6 August 2022, date of publication 16 August 2022, date of current version 22 August 2022.
Expert Systems With Applications 210 (2022) 118477
1030 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 2, MARCH 2020
Engineering Geology 114 (2010) 298–311
Peer-to-Peer Networking and Applications
Peer-to-Peer Networking and Applications
Computer Networks 220 (2023) 109477
J Netw Syst Manage (2017) 25:321–374
Useful Sysctl Settings Sysctl on Linux systems can tweak many
9 The economics and politics of data and its legal