期刊文献+
共找到21,149篇文章
< 1 2 250 >
每页显示 20 50 100
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
1
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
A Self-Attention Based Dynamic Resource Management for Satellite-Terrestrial Networks
2
作者 Lin Tianhao Luo Zhiyong 《China Communications》 SCIE CSCD 2024年第4期136-150,共15页
The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power suppor... The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks. 展开更多
关键词 mobile edge computing resource management satellite-terrestrial networks self-attention
下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
3
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
4
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
下载PDF
Research and Implementation of Network Intelligent Management Based on CSCW
5
作者 沈俊 罗军舟 顾冠群 《Journal of Southeast University(English Edition)》 EI CAS 1999年第1期44-48,共5页
This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supp... This paper analyzes progresses and difficulties of subjects on computer network’s management and artificial intelligence, proposes AGIMA, a new model of network intelligent management, which is based on computer supported cooperative work (CSCW) and combining new technologies such as WWW, Java. AGIMA transfers from information distribution centered mode in traditional network management to computing distribution centered mode, providing intelligence capacity for network management by a whole intelligent agent group. The implementation of AGIMA takes much consideration of openess, scalability, proactive adaptability and friendliness of human computer interface. Authors present properties of intelligent agent in details, and conclude that network intelligence should be cooperation between human and computer. 展开更多
关键词 network management artificial intelligence CSCW WWW multi agent system
下载PDF
What to Cache:Differentiated Caching Resource Allocation and Management in Information-Centric Networking 被引量:6
6
作者 Ru Huo Renchao Xie +2 位作者 Hengyang Zhang Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2016年第12期261-276,共16页
Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching metho... Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence. 展开更多
关键词 caching resource allocation management differentiation control process information-centric networking
下载PDF
CifNet Network Multi-Well Data Management System 被引量:11
7
作者 LiNing Mingchao CuiJian WangJianqiang WangCaizhi 《Applied Geophysics》 SCIE CSCD 2004年第2期129-131,共3页
The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing ... The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3,ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented. 展开更多
关键词 MULTI-WELL network data management CifNet
下载PDF
Aviation-oriented Mobility Management Method in IP/LEO Satellite Networks
8
作者 郭欣 张军 +1 位作者 张涛 丁演文 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2008年第3期252-260,共9页
Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented m... Taking into chief consideration the features of aviation nodes in satellite networks, such as high moving speed, long communication distance, and high connection frequency, this article proposes an aviation-oriented mobility management method for IP/low earth orbit (LEO) satellite networks. By introducing the concept of ground station real-time coverage area, the proposed method uses ground-station-based IP addressing method and cell paging scheme to decrease the frequency of IP binding update requests as well as the paging cost. In comparison with the paging mobile IP (P-MIP) method and the handover-independent IP mobility management method, as is verified by the mathematical analysis and simulation, the proposed method could decrease the management cost. It also possesses better ability to support the aviation nodes because it is subjected to fewer influences from increased node speeds and newly coming connection rates. 展开更多
关键词 mobility management IP address binding update ground station management aviation node IP/LEO satellite networks
下载PDF
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model 被引量:5
9
作者 FU Cai HONG Fan LI Rui-xian HONG Liang CHEN Jing 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期188-192,共5页
In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public k... In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better. 展开更多
关键词 Ad Hoc networks self-organize bidirectional trust public key management.
下载PDF
Machine Learning Empowered Beam Management for Intelligent Reflecting Surface Assisted MmWave Networks 被引量:9
10
作者 Chenglu Jia Hui Gao +1 位作者 Na Chen Yuan He 《China Communications》 SCIE CSCD 2020年第10期100-114,共15页
Recently,intelligent reflecting surface(IRS)assisted mmWave networks are emerging,which bear the potential to address the blockage issue of the millimeter wave(mmWave)communication in a more cost-effective way.In part... Recently,intelligent reflecting surface(IRS)assisted mmWave networks are emerging,which bear the potential to address the blockage issue of the millimeter wave(mmWave)communication in a more cost-effective way.In particular,IRS is built by passive and programmable electromagnetic elements that can manipulate the mmWave propagation channel into a more favorable condition that is free of blockage via judicious joint base station(BS)-IRS transmission design.However,the coexistence of IRSs and mmWave BSs complicates the network architecture,and thus poses great challenges for efficient beam management(BM)that is one critical prerequisite for high performance mmWave networks.In this paper,we systematically evaluate the key issues and challenges of BM for IRS-assisted mmWave networks to bring insights into the future network design.Specifically,we carefully classify and discuss the extensibility and limitations of the existing BM of conventional mmWave towards the IRS-assisted new paradigm.Moreover,we propose a novel machine learning empowered BM framework for IRS-assisted networks with representative showcases,which processes environmental and mobility awareness to achieve highly efficient BM with significantly reduced system overhead.Finally,some interesting future directions are also suggested to inspire further researches. 展开更多
关键词 mmWave networks IRS beam management machine learning
下载PDF
Light-Weight Simple Network Management Protocol in Wireless Sensor Networks 被引量:2
11
作者 高德云 朱婉婷 方然 《China Communications》 SCIE CSCD 2011年第8期121-129,共9页
A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node ag... A Light-Weight Simple Network Management Protocol (LW-SNMP) for the wireless sensor network is proposed, which is a kind of hierarchical network management system including a sink manager, cluster proxies, and node agents. Considering the resource limitations on the sensor nodes, we design new management messages, new data types and new management information base completely. The management messages between the cluster proxy and node agents are delivered as normal data packets. The experiment results show that LW-SNMP can meet the management demands in the resource-limited wireless sensor networks and has a good performance in stability, effectiveness of memory, extensibility than the traditional Simple Network Management Protocol (SNMP). 展开更多
关键词 WSNS network management lightweight simple network management protocol sink manager cluster proxy node agent
下载PDF
A Parking Management System Based on Wireless Sensor Network 被引量:3
12
作者 BI Yan-Zhong SUN Li-Min +2 位作者 ZHU Hong-Song YAN Ting-Xin LUO Zheng-Jun 《自动化学报》 EI CSCD 北大核心 2006年第6期968-977,共10页
This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink... This paper introduces a parking management system based on a wireless sensor network developed by our group. The system consists of a large amount of parking space monitoring nodes, a few parking guiding nodes, a sink node and a management station. All the nodes exchange information with each other through wireless communication. The prototype of the parking management system has been implemented and the preliminary test results show that the performance of the system can satisfy the requirements of the application. 展开更多
关键词 Wireless sensor network APPLICATION parking management parking guidance
下载PDF
Cognitive Network Management in Internet of Things 被引量:5
13
作者 覃毅芳 沈强 +4 位作者 林涛 赵志军 唐晖 慈松 冯志勇 《China Communications》 SCIE CSCD 2011年第1期1-7,共7页
The wide variety of smart embedded computing devices and their increasing number of applications in our daily life have created new op- portunities to acquire knowledge from the physical world anytime and anywhere, wh... The wide variety of smart embedded computing devices and their increasing number of applications in our daily life have created new op- portunities to acquire knowledge from the physical world anytime and anywhere, which is envisioned as the"Internet of Things" (IoT). Since a huge number of heterogeneous resources are brought in- to IoT, one of the main challenges is how to effi- ciently manage the increasing complexity of IoT in a scalable, flexNle, and autonomic way. Further- more, the emerging IoT applications will require collaborations among loosely coupled devices, which may reside in various locations of the Inter- net. In this paper, we propose a new IoT network management architecture based on cognitive net- work management technology and Service-Orien- ted Architecture to provide effective and efficient network management of loT. 展开更多
关键词 cognitive network management Serv- ice-Oriented Architecture (SOA) Internet of Things policy-based network management
下载PDF
A Game-Theoretic Perspective on Resource Management for Large-Scale UAV Communication Networks 被引量:9
14
作者 Jiaxin Chen Ping Chen +3 位作者 Qihui Wu Yuhua Xu Nan Qi Tao Fang 《China Communications》 SCIE CSCD 2021年第1期70-87,共18页
As a result of rapid development in electronics and communication technology,large-scale unmanned aerial vehicles(UAVs)are harnessed for various promising applications in a coordinated manner.Although it poses numerou... As a result of rapid development in electronics and communication technology,large-scale unmanned aerial vehicles(UAVs)are harnessed for various promising applications in a coordinated manner.Although it poses numerous advantages,resource management among various domains in large-scale UAV communication networks is the key challenge to be solved urgently.Specifically,due to the inherent requirements and future development trend,distributed resource management is suitable.In this article,we investigate the resource management problem for large-scale UAV communication networks from game-theoretic perspective which are exactly coincident with the distributed and autonomous manner.By exploring the inherent features,the distinctive challenges are discussed.Then,we explore several gametheoretic models that not only combat the challenges but also have broad application prospects.We provide the basics of each game-theoretic model and discuss the potential applications for resource management in large-scale UAV communication networks.Specifically,mean-field game,graphical game,Stackelberg game,coalition game and potential game are included.After that,we propose two innovative case studies to highlight the feasibility of such novel game-theoretic models.Finally,we give some future research directions to shed light on future opportunities and applications. 展开更多
关键词 large-scale UAV communication networks resource management game-theoretic model
下载PDF
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
15
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed Web network management CORBA JAVA
下载PDF
Quantum Communication Networks and Trust Management: A Survey 被引量:5
16
作者 Shibin Zhang Yan Chang +5 位作者 Lili Yan Zhiwei Sheng Fan Yang Guihua Han Yuanyuan Huang Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2019年第9期1145-1174,共30页
This paper summarizes the state of art in quantum communication networks and trust management in recent years.As in the classical networks,trust management is the premise and foundation of quantum secure communication... This paper summarizes the state of art in quantum communication networks and trust management in recent years.As in the classical networks,trust management is the premise and foundation of quantum secure communication and cannot simply be attributed to security issues,therefore the basic and importance of trust management in quantum communication networks should be taken more seriously.Compared with other theories and techniques in quantum communication,the trust of quantum communication and trust management model in quantum communication network environment is still in its initial stage.In this paper,the core technologies of establishing secure and reliable quantum communication networks are categorized and summarized,and the trends of each direction in trust management of quantum communication network are discussed in depth. 展开更多
关键词 Quantum communication quantum communication network TRUST trust management trust management model
下载PDF
A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks 被引量:7
17
作者 Alanoud Alhussain Heba Kurdi Lina Altoaimy 《Computers, Materials & Continua》 SCIE EI 2019年第6期805-815,共11页
Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.... Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems. 展开更多
关键词 Trust management neural networks peer to peer machine learning edge devices
下载PDF
A Utility-Based Buffer Management Policy for Improving Data Dissemination in Opportunistic Networks 被引量:5
18
作者 Jiansheng Yao Chunguang Ma +2 位作者 Haitao Yu Yanling Liu Qi Yuan 《China Communications》 SCIE CSCD 2017年第7期118-126,共9页
In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management str... In opportunistic networks, most existing buffer management policies including scheduling and passive dropping policies are mainly for routing protocols. In this paper, we proposed a Utility-based Buffer Management strategy(UBM) for data dissemination in opportunistic networks. In UBM, we first design a method of computing the utility values of caching messages according to the interest of nodes and the delivery probability of messages, and then propose an overall buffer management policy based on the utility. UBM driven by receivers completely implements not only caching policies, passive and proactive dropping policies, but also scheduling policies of senders. Simulation results show that, compared with some classical dropping strategies, UBM can obtain higher delivery ratio and lower delay latency by using smaller network cost. 展开更多
关键词 opportunistic networks data dissemination buffer management strategy utility-based
下载PDF
Dynamic Cluster Key Management Scheme on Wireless Sensor Networks 被引量:2
19
作者 Pei Qingqi Li Hongning +2 位作者 Pang Liaojun Hao Yin Hong Tang 《China Communications》 SCIE CSCD 2010年第1期73-79,共7页
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system canno... Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system cannot guarantee the security of the wireless sensor network for communications, this paper introduces a hierarchical key management scheme based on the different abilities of different sensor nodes in the clustered wireless sensor network. In this scheme, the nodes are distributed into several clusters, and a cluster head must be elected for each cluster. Private communication between cluster heads is realized through the encryption system based on the identity of each head while private communication between cluster nodes in a same cluster head is achieved through the random key preliminary distribution system. Considering the characteristics of WSN, we adopt dynamic means called dynamic cluster key management scheme to deal with master key, so master key will be updated according to the changed dynamic network topology. For cluster head node plays a pivotal role in this scheme, a trust manage-ment system should be introduced into the election of the cluster head which will exclude the malicious node from outside the cluster, thus improve the whole network security. 展开更多
关键词 wireless sensor networks IDENTITY-BASED ENCRYPTION SYSTEM RANDOM key PRELIMINARY distribution SYSTEM TRUST management SYSTEM
下载PDF
Traffic Characteristics Based Dynamic Radio Resource Management in Heterogeneous Wireless Networks 被引量:4
20
作者 WEN Juan SHENG Min ZHANG Yan WANG Xijun LI Yuzhou 《China Communications》 SCIE CSCD 2014年第1期1-11,共11页
The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy R... The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization. 展开更多
关键词 heterogeneous wireless networks radio resource management multidimensional Markov analysis tidal traffic performance analysis
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部