The provision of services such as credit card facilities using Intelligent networks (IN) depends upon the ability to process real-time data. If their data is deliberately delayed during transit, these services may not...
详细信息
The provision of services such as credit card facilities using Intelligent networks (IN) depends upon the ability to process real-time data. If their data is deliberately delayed during transit, these services may not be able to function accurately. This paper examines INs and highlights their vulnerability to network delay attacks. In particular, the nature of rear-time communications and the main approach that has been developed to determine whether received data is being sent in real-time or not is discussed. The deficiencies in this approach in terms of its ability to counteract the different forms of a network delay attack are highlighted and an alternative method which addresses these drawbacks is presented. Finally, the results achieved following the implementation and subsequent testing of the alternative approach are discussed. (C) 1997 Elsevier Science B.V.
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management system...
详细信息
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management systems. These are examined in tum to give the reader an overview of the state-of-the-art in security management. The ISO OSI Reference Model is used as a basis to present the security threats, security services and mechanisms which have to be managed. Telecommunications management networks are used as an example of management applications which both provide management and require the provision of security and security management services. The OSI approach to network management is examined in detail. This is followed by a survey of the categories of OSI security management activities, and a discussion of the security management needs of various common security services. The need for security for network management systems is examined.
Several international standards for asynchronous data compression are available today. In 1993 the International Telecommunication Union (ITU) started to research possible ways to compress synchronous data. Special at...
详细信息
Several international standards for asynchronous data compression are available today. In 1993 the International Telecommunication Union (ITU) started to research possible ways to compress synchronous data. Special attention was given to compatibility with previous asynchronous standards, namely V.42bis. In September 1993 a proposal for modification of the V.42bis standard to make ii applicable to synchronous data was published. In this paper a prototype of a synchronous data link layer protocol based on the ITU proposals is described. The protocol chosen is HDLC based. The V.42bis compression standard is adapted to serve the needs of a synchronous protocol. A functional model is designed followed by a performance analysis of the protocol. The analysis shows a decrease of the compression ratio due to the adaption of the compression algorithm. (C) 1997 Elsevier Science B.V.
As a cutting-edge technology of low-altitude Artificial Intelligence of Thing (AIoT), UAV object detection significantly enhances the surveillance services capabilities of low-altitude AIoT. However, the difficulty of...
详细信息
This paper presents an approach to the specification of external interfaces of an electronic broker used in the Architecture for Electronic Brokerage systems (AEBS). The external interface specified by the AEBS archit...
详细信息
PodNet is an opportunistic architecture allowing to exchange multimedia content, or podcasts, from mobiles to mobiles in an opportunistic fashion using Wifi. Content can originate from the Internet (e.g., YouTube, BBC...
详细信息
Opportunistic networks enable mobile users to participate in various social interactions with applications such as content distribution and micro-blogs. Because of their distributed nature, securing user interactions ...
详细信息
Community Health Information Tracking System using Short Message Service (chitSMS) is an extension of CHITS which is a system that stores health records of patients in the barangay. Another project incorporated a mobi...
详细信息
Image processing, specifically extracting regions of interest, being a costly operation would benefit from a method of storing its output region and input image data in a database for future querying so as to prevent ...
详细信息
Current methods in mapping the availability of WiFi networks, such as crowdsourcing platforms (e.g. Project BASS and CoverageMap) and dedicated wardriving, face limitations in terms of data recency, volume, and cost-e...
详细信息
暂无评论