Search

Showing total 6 results
6 results

Search Results

1. Fine-granularity inference and estimations to network traffic for SDN.

2. A decoy chain deployment method based on SDN and NFV against penetration attack.

3. A multi-domain trust management model for supporting RFID applications of IoT.

4. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks.

5. Enhancing the Flexibility of TCP in Heterogeneous Network.

6. A Multi-Objective Compounded Local Mobile Cloud Architecture Using Priority Queues to Process Multiple Jobs.