Analysis and Performance Evaluation of Different Methods to Achieve Way-Point Enforcement in Hybrid SDN

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:AINA (34. : 2020 : Caserta) Web, Artificial Intelligence and Network Applications ; Set 1
1. Verfasser: Rathee, Sandhya (VerfasserIn)
Weitere Verfasser: Haribabu, K. (VerfasserIn), Patel, Parth (VerfasserIn), Bhatia, Ashutosh (VerfasserIn), Gandhi, Ujjwal (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Educational Microclimate Mesonet System Design 2020 Robertson, James
Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet 2020 Odagiri, Kazuya
A Taxonomy of Trust Models for Attribute Assurance in Identity Management 2020 Grüner, Andreas
SDN-Based Replication Management Framework for CCN Networks 2020 Fekih, Amna
Bitcoin Data Analytics: Exploring Research Avenues and Implementing a Hadoop-Based Analytics Framework 2020 Shah, Raj Sanjay
A Review Towards the Development of Ontology Based Identity and Access Management Metamodel 2020 Nahar, Kamrun
Efficient Method for Link Protection Under Multiple Constraints Using ZDD 2020 Akasaka, Masataka
Electricity Load and Price Forecasting Using Machine Learning Algorithms in Smart Grid: A Survey 2020 Arif, Arooj
An Automatic Software Quality and Function Assurance Case Study for Agile 2020 Hsu, Wei
Hash Flow: An Access Control Mechanism for Software Defined Network 2020 Chang, Shih-Hao
Method by Protection to Reduce Probability of Cascade Failure 2020 Morino, Yuma
Proposal of a Self-help Support System in a Mega Disaster 2020 Taniguchi, Yudai
A Comparison Study of Control Devices for an Omnidirectional Wheelchair 2020 Mitsugi, Kenshiro
Document Business Process Model Extension for Modeling Secure Ubiquitous Documents 2020 Maroua, Nouioua
Implementation and Evaluation on Automated E-Learning Contents Creation Based on Natural Language Processing Techniques 2020 Wang, Yiyi
2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes 2020 Catillo, Marta
An Ontology for OASIS TOSCA 2020 Martino, Beniamino Di
Intrusion Detection Based on Cluster Analysis and Nonsymmetric Autoencoder 2020 Nie, Junke
Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing 2020 Zhao, Kaiyang
Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme 2020 Mbarek, Bacem
Alle Artikel auflisten