Information security in scale free networks
Abstract
Index Terms
- Information security in scale free networks
Recommendations
Information security in scale free networks
MoMM '12: Proceedings of the 10th International Conference on Advances in Mobile Computing & MultimediaWe address issues surrounding information security in scale free networks. This type of networks obey power law distribution instead of Poisson distribution, and hence a departure from randomness. There exist phase transitions between disorder and order,...
Security of Software Defined Networks
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper ...
Exploring Blockchain-driven security in SDN-based IoT networks
AbstractThe Internet of Things (IoT) is an emerging field of technology with a huge scope of its applicability in various industries and a wide range of societal needs, including medical sciences. However, IoT suffers from many limitations like energy, ...
Highlights- Comprehensive discussions of Internet of Things (IoT), Software-Defined Networking (SDN), and Blockchain.
- Analysing the existing frameworks and architectures proposed by various researchers.
- Highlight the key security issues that ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- @WAS: International Organization of Information Integration and Web-based Applications and Services
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tag
Qualifiers
- Keynote
Conference
- @WAS
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in