咨询与建议

限定检索结果

文献类型

  • 28 篇 期刊文献
  • 26 篇 会议

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 33 篇 电气工程
    • 32 篇 计算机科学与技术...
    • 28 篇 信息与通信工程
    • 8 篇 电子科学与技术(可...
    • 4 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 网络空间安全
  • 4 篇 理学
    • 3 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
  • 1 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 54 篇 network function...
  • 11 篇 software defined...
  • 8 篇 cloud computing
  • 6 篇 software defined...
  • 6 篇 security
  • 5 篇 nfv
  • 5 篇 virtualisation
  • 5 篇 service function...
  • 4 篇 5g
  • 3 篇 placement
  • 3 篇 network slicing
  • 3 篇 quality of exper...
  • 3 篇 security archite...
  • 2 篇 internet of thin...
  • 2 篇 proof-of-concept
  • 2 篇 nfv architecture
  • 2 篇 software-defined...
  • 2 篇 architectural fr...
  • 2 篇 control system s...
  • 2 篇 5g mobile commun...

机构

  • 2 篇 northeastern uni...
  • 2 篇 fbk create net t...
  • 2 篇 ibm res lab haif...
  • 2 篇 univ politecn ca...
  • 2 篇 northeastern uni...
  • 1 篇 makerere univ de...
  • 1 篇 politecn torino ...
  • 1 篇 faculty of infor...
  • 1 篇 cetic res ctr ch...
  • 1 篇 univ newcastle s...
  • 1 篇 adaptera pc maro...
  • 1 篇 univ bedfordshir...
  • 1 篇 ericsson ab eric...
  • 1 篇 northeastern uni...
  • 1 篇 univ newcastle a...
  • 1 篇 natl univ def te...
  • 1 篇 consorzio nazl i...
  • 1 篇 univ lisbon ist ...
  • 1 篇 tsinghua univ ts...
  • 1 篇 british telecomm...

作者

  • 3 篇 varadharajan vij...
  • 3 篇 tupakula uday
  • 3 篇 cosmas john
  • 2 篇 francescon anton...
  • 2 篇 mazurczyk wojcie...
  • 2 篇 popescu adrian
  • 2 篇 wang xingwei
  • 2 篇 kourtis michail-...
  • 2 篇 fedrizzi riccard...
  • 2 篇 endo patricia ta...
  • 2 篇 lioy antonio
  • 2 篇 huang min
  • 2 篇 zhang peiying
  • 2 篇 karmakar kallol ...
  • 2 篇 zetik rudolf
  • 2 篇 santos guto leon...
  • 2 篇 levin anna
  • 2 篇 georgalas nektar...
  • 2 篇 villari massimo
  • 2 篇 gorricho juan-lu...

语言

  • 53 篇 英文
  • 1 篇 中文
检索条件"主题词=Network Function Virtualisation"
54 条 记 录,以下是11-20 订阅
排序:
Availability-aware and energy-aware dynamic SFC placement using reinforcement learning
收藏 引用
JOURNAL OF SUPERCOMPUTING 2021年 第11期77卷 12711-12740页
作者: Santos, Guto Leoni Lynn, Theo Kelner, Judith Endo, Patricia Takako Univ Fed Pernambuco UFPE Ctr Informat Recife PE Brazil Dublin City Univ Business Sch Dublin Ireland Univ Pernambuco UPE Recife PE Brazil
Software-defined networking and network functions virtualisation are making networks programmable and consequently much more flexible and agile. To meet service-level agreements, achieve greater utilisation of legacy ... 详细信息
来源: 评论
network slicing: a next generation 5G perspective
收藏 引用
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND networkING 2021年 第1期2021卷 1-26页
作者: Subedi, Prashant Alsadoon, Abeer Prasad, P. W. C. Rehman, Sabih Giweli, Nabil Imran, Muhammad Arif, Samrah Charles Sturt Univ Sch Comp & Math Sydney NSW Australia Univ Western Sydney UWS Sch Comp Data & Math Sci Sydney NSW Australia Charles Sturt Univ Sch Comp & Math Port Macquarie Australia King Saud Univ Coll Appl Comp Sci Riyadh Saudi Arabia
Fifth-generation (5G) wireless networks are projected to bring a major transformation to the current fourth-generation network to support the billions of devices that will be connected to the Internet. 5G networks wil... 详细信息
来源: 评论
A multi-stage graph based algorithm for survivable Service function Chain orchestration with backup resource sharing
收藏 引用
COMPUTER COMMUNICATIONS 2021年 174卷 42-60页
作者: Kibalya, Godfrey Serrat, Joan Gorricho, Juan-Luis Serugunda, Jonathan Zhang, Peiying Univ Politecn Cataluna Dept Network Engn C Jordi Girona 1-3Edif C3Campus Nord Barcelona 08034 Spain Makerere Univ Dept Elect & Comp Engn Kampala Uganda China Univ Petr East China Coll Comp Sci & Technol Qingdao 266580 Peoples R China
network softwarisation introduces flexibility in network management by enabling the deployment of network functions as software modules running on virtual machines. However, this creates new concerns for service avail... 详细信息
来源: 评论
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system
收藏 引用
ENTERPRISE INFORMATION SYSTEMS 2023年 第3期17卷 Article: 2023764页
作者: Gaurav, Akshat Gupta, Brij B. Panigrahi, Prabin Kumar Ronin Inst Montclair NJ USA Natl Inst Technol Dept Comp Engn Kurukshetra Haryana India Asia Univ Dept Comp Sci & Informat Engn Taichung 413 Taiwan Staffordshire Univ Stoke On Trent ST4 2DE Staffs England Indian Inst Management Indore Indore India
The Internet of Things (IoT) is a relatively new technology that has piqued academics' and business information systems' attention in recent years. The Internet of Things establishes a network that enables sma... 详细信息
来源: 评论
Energy Efficiency in Edge Environments: a Serverless Computing Approach  18th
Energy Efficiency in Edge Environments: a Serverless Computi...
收藏 引用
18th International Conference on the Economics of Grids, Clouds, Systems, and Services (GECON )
作者: Djemame, Karim Univ Leeds Sch Comp Leeds W Yorkshire England
The paper revisits the Internet Architecture by leveraging Software Defined networks (SDN) with network function virtualisation (NFV) technologies to allow efficient and on-demand placement of Virtual network function... 详细信息
来源: 评论
Towards QoS-aware Provisioning of Chained Virtual Security Services in Edge networks  17
Towards QoS-aware Provisioning of Chained Virtual Security S...
收藏 引用
IFIP/IEEE International Symposium on Integrated network Management (IM)
作者: Iordache-Sica, Mircea M. Anagnostopoulos, Christos Pezaros, Dimitrios P. Univ Glasgow Sch Comp Sci Glasgow G12 8QQ Lanark Scotland
Future networks are expected to deliver low-latency, user-specific services in a flexible and efficient manner. Operators have to ensure infrastructure resilience in the face of such challenges, while maintaining serv... 详细信息
来源: 评论
Automating the Service function Chain Availability Assessment  26
Automating the Service Function Chain Availability Assessmen...
收藏 引用
26th IEEE Symposium on Computers and Communications (IEEE ISCC)
作者: Santos, Guto Leoni Endo, Patricia Takako Lynn, Theo Sadok, Djamel Kelner, Judith Univ Fed Pernambuco Recife PE Brazil Univ Pernambuco Recife PE Brazil Dublin City Univ Dublin Ireland
Modern telecommunications networks are characterised by increased dynamism and heterogeneity from the cloud to the edge. To meet these requirements and remain competitive, network operators use software defined networ... 详细信息
来源: 评论
Techniques for Securing Control Systems from Attacks  20
Techniques for Securing Control Systems from Attacks
收藏 引用
20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Tupakula, Uday Varadharajan, Vijay Karmakar, Kallol Krishna Univ Newcastle Adv Cyber Secur Engn Res Ctr Newcastle NSW Australia
Increasingly Industrial Control Systems (ICS) systems are being connected to the Internet to minimise the operational costs and provide additional flexibility. These control systems such as the ones used in power grid... 详细信息
来源: 评论
Management and enforcement of secured E2E network slices across transport domains
收藏 引用
OPTICAL FIBER TECHNOLOGY 2022年 第0期73卷
作者: Alemany, Pol Molina, Alejandro Dangerville, Cyril Asensio, Rodrigo Ayed, Dhouha Munoz, Raul Casellas, Ramon Martinez, Ricardo Skarmeta, Antonio Vilalta, Ricard Ctr Tecnol Telecomunicac Catalunya CTTC CERCA Carl Friedrich Gauss Av 7 Castelldefels 08860 Catalonia Spain Univ Murcia Comp Sci Fac Campus Espinardo Murcia 30100 Spain Thales 1 Av Augustin Fresnel F-91120 Palaiseau Essonne France
Due to the fact that the current variability of services is brought by the current networks and the new possibilities that will appear thanks to the near-future networks, network Slicing has become one of the key elem... 详细信息
来源: 评论
Counteracting Attacks From Malicious End Hosts in Software Defined networks
收藏 引用
IEEE TRANSACTIONS ON network AND SERVICE MANAGEMENT 2020年 第1期17卷 160-174页
作者: Varadharajan, Vijay Tupakula, Uday Univ Newcastle Fac Engn & Built Environm Newcastle NSW 2308 Australia Univ Newcastle Sch Elect Engn & Comp Newcastle NSW 2308 Australia
This paper proposes security techniques for counteracting attacks from malicious end hosts in a software defined networking (SDN) environment. This paper describes the design of a security architecture, which comprise... 详细信息
来源: 评论