The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l...The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.展开更多
With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security ri...With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures.展开更多
With the continuous development of network communication technology and computer technology, parallel computer network applications becoming more widely, its reliability has attracted more attention on researcher. Thi...With the continuous development of network communication technology and computer technology, parallel computer network applications becoming more widely, its reliability has attracted more attention on researcher. This paper gives a introduction to a simple computer network, given the reliability of the design criteria for computer network analysis, and finally through the examples to illustrate the computer network hardware and software reliability.展开更多
基金supported by the Natural Science Foundation of Beijing under Grant No.4132048,NSFC(61472047),and NSFC(61202435)
文摘The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.
文摘With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures.
文摘With the continuous development of network communication technology and computer technology, parallel computer network applications becoming more widely, its reliability has attracted more attention on researcher. This paper gives a introduction to a simple computer network, given the reliability of the design criteria for computer network analysis, and finally through the examples to illustrate the computer network hardware and software reliability.