Interlayer link prediction based on multiple network structural attributes
Information may flow across multiple social network platforms and spread simultaneously on them. These platforms constitute a multiplex network in which each social network platform functions as a subnetwork. One problem in information ...
Towards an internet-scale overlay network for latency-aware decentralized workflows at the edge
Small-scale data centers at the edge are becoming prominent in offering various services to the end-users following the cloud model while avoiding the high latency inherent to the classic cloud environments when accessed from remote ...
Energy efficient 3D network-on-chip based on approximate communication
Technology advancement and integration of many cores into a chip lead to high-performance parallel architectures in computing systems. Three-dimensional Network-on-Chips (3D NoCs) have been adopted as a promising architecture in the ...
Edge security for SIP-enabled IoT devices with P4
The exponential growth of IoT devices poses security concerns, in part because they provide a fertile breeding ground for botnets. For example, the Mirai botnet infected almost 65,000 devices in its first 20 h. With the prevalence of ...
Proactive and intelligent evaluation of big data queries in edge clouds with materialized views
The rise of big data brings extraordinary benefits and opportunities to businesses and governments. Enterprise users can analyze their consumers’ data and infer the business value, such as purchasing goods correlations and customer ...
A mobility-compliant publish–subscribe system for an information-centric Internet of Things
The Information centric networking paradigm has proven particularly useful for the constrained Internet of Things (IoT), in which nodes are challenged by end-to-end communication without network assistance. This work focuses on the ...
Flexible IP: An adaptable IP address structure and its efficient addressing scheme
The conventional IP address is designed with fixed length and lacking of extensibility, while the demand for addresses varies greatly in different scenarios. Flexible IP (FlexIP), as a variable length IP address, proactively makes ...
Balanced resource allocation for VNF service chain provisioning in inter-datacenter elastic optical networks
Network Function Virtualization (NFV) is a novel technology that enables flexible and cost-effective network services by replacing the hardware-based middleboxes with software instances named virtual network functions (VNFs). In NFV, ...
6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning
IPv6 target generation is critical in fast IPv6 scanning for Internet-wide surveys and cybersecurity analysis. However, existing techniques generally suffer from low hit rates because the targets are generated from inappropriate ...
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges
- Enrique Mármol Campos,
- Pablo Fernández Saura,
- Aurora González-Vidal,
- José L. Hernández-Ramos,
- Jorge Bernal Bernabé,
- Gianmarco Baldini,
- Antonio Skarmeta
The application of Machine Learning (ML) techniques to the well-known intrusion detection systems (IDS) is key to cope with increasingly sophisticated cybersecurity attacks through an effective and efficient detection process. In the ...
Highlights
- Analysis of existing of FL-enabled IDS approaches for IoT based on a set of identified criteria.
Scaling migrations and replications of Virtual Network Functions based on network traffic forecasting
Migration and replication of virtual network functions (VNFs) are well-known mechanisms to face dynamic resource requests in Internet Service Provider (ISP) edge networks. They are not only used to reallocate resources in carrier ...
HSA-SPC: Hybrid Spectrum Access with Spectrum Prediction and Cooperation for Performance Enhancement of Multiuser Cognitive Radio Network
The spectrum sensing (SS) is employed to identify the status of licensed channel in the cognitive radio/user (CR/CU). Arbitrarily choosing the licensed channel for sensing in high traffic intensity network results into reduced ...
LightLog: A lightweight temporal convolutional network for log anomaly detection on the edge
Log anomaly detection on edge devices is the key to enhance edge security when deploying IoT systems. Despite the success of many newly proposed deep learning based log anomaly detection methods, handling large-scale logs on edge ...
A survey of trust management in the Internet of Vehicles
In recent years, the emergence of the Internet of Vehicles (IoV) aims to enhance the users’ quality of experience through proposing more sophisticated services ranging from guaranteeing the user safety to improving his comfort. The IoV ...
Data signals for Terahertz communications research
- Duschia Bodet,
- Jacob Hall,
- Priyangshu Sen,
- Rachel Johnson,
- Isabelle Brandicourt,
- Xavier Cantos Roman,
- Omar Shoura,
- Josep Miquel Jornet
The Terahertz (THz) band (0.1–10 THz) is a key asset to unlock the next generation of wireless communication systems. With larger available bandwidths, THz systems would allow for faster data rates to interconnect many more users than ...
SSAPPIDENTIFY: A robust system identifies application over Shadowsocks’s traffic
As an effective tool for penetrating firewalls and bypassing supervision and censorship, Shadowsocks is widely used, and there are also illegal network activists. If there is a traffic identification system that can identify ...
A blockchain-based Fog-oriented lightweight framework for smart public vehicular transportation systems
Rapid urbanization is putting a strain on the transport systems of cities worldwide. The effects of this trend include prolonged traffic jams and increasing environmental pollution from rising C O 2 emissions. As city planning requires ...
Optimal pricing-based computation offloading and resource allocation for blockchain-enabled beyond 5G networks
Computation offloading has been considered as a promising solution for resource-constrained mobile devices supporting computation-intensive mobile collaborative applications in beyond 5G networks. By leveraging network-assisted device-...
Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G
Along with the high demand for network connectivity from both end-users and service providers, networks have become highly complex; and so has become their lifecycle management. Recent advances in automation, data analysis, artificial ...
Blockchain-based privacy preserving e-health system for healthcare data in cloud
Cloud-assisted electronic health (e-health) system has played an important role in the management of healthcare data, which can provide efficient and convenient storage services for the patients to store their electronic health records ...