Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of service(DDoS) attack, which aims to drain the resources of SDN switches and controllers,is one of the most common. Once the switch or controller is damaged, the network services can be *** defense schemes against DDoS attacks have been proposed from the perspective of attack detection;however, such defense schemes are known to suffer from a time consuming and unpromising accuracy, which could result in an unavailable network service before specific countermeasures are taken. To address this issue through a systematic investigation, we propose an elaborate resource-management mechanism against DDoS attacks in an SDN. Specifically, by considering the SDN topology, we leverage the M/M/c queuing model to measure the resistance of an SDN to DDoS attacks. Network administrators can therefore invest a reasonable number of resources into SDN switches and SDN controllers to defend against DDoS attacks while guaranteeing the quality of service(QoS). Comprehensive analyses and empirical data-based experiments demonstrate the effectiveness of the proposed approach.
Although high-performance artificial intelligence (AI) models require substantial computational resources, embedded systems are constrained by limited hardware capabilities, such as memory and processing power. On the...
详细信息
• Different statistical and machine learning approaches have been evaluated for modeling paper drying process. • A web-based interface also developed to store machine runs results into a local database for more comple...
详细信息
Stress is one of the major concerns for students in recent days. The rapid changes in the environment, lack of adoptability, life style habits, social media interactions, education, finance in all means, students buil...
详细信息
This survey paper examines the advancements and challenges in chatbot technology, focusing on deep neural networks (DNNs) and their application in natural language processing (NLP). It discusses various chatbot models...
详细信息
This paper proposes an optimal solution for monitoring water quality in Sri Lanka, where reservoirs are essential for daily life and agriculture, especially in rural areas. Despite its importance, 3.6 million communit...
详细信息
Visible‐infrared person re‐identification(VI‐ReID)is a supplementary task of single‐modality re‐identification,which makes up for the defect of conventional re‐identification under insufficient *** is more chall...
详细信息
Visible‐infrared person re‐identification(VI‐ReID)is a supplementary task of single‐modality re‐identification,which makes up for the defect of conventional re‐identification under insufficient *** is more challenging than single‐modality ReID because,in addition to difficulties in pedestrian posture,camera shoot-ing angle and background change,there are also difficulties in the cross‐modality *** works only involve coarse‐grained global features in the re‐ranking calculation,which cannot effectively use fine‐grained ***,fine‐grained features are particularly important due to the lack of information in cross‐modality re‐*** this end,the Q‐center Multi‐granularity K‐reciprocal Re‐ranking Algorithm(termed QCMR)is proposed,including a Q‐nearest neighbour centre encoder(termed QNC)and a Multi‐granularity K‐reciprocal Encoder(termed MGK)for a more comprehensive feature *** converts the probe‐corresponding modality features into gallery corresponding modality features through modality transfer to narrow the modality *** takes a coarse‐grained mutual nearest neighbour as the dominant and combines a fine‐grained nearest neighbour as a supplement for similarity *** experiments on two widely used VI‐ReID benchmarks,SYSU‐MM01 and RegDB have shown that our method achieves state‐of‐the‐art ***,the mAP of SYSU‐MM01 is increased by 5.9%in all‐search mode.
Authentication and authorization protocols simplify the login authorization of third-party applications and provide basic guarantees and prerequisites for security services. However, due to the high uncertainty of pro...
详细信息
Positive and Unlabeled (PU) learning is a learning method which can be applied to various field such as recommendation and big data analysis. A direct method to solve PU learning is transform it into a weighted classi...
详细信息
Vehicle Ad Hoc Network (VANET) is one of the important means to realize intelligent transportation system, which can improve road safety and traffic efficiency. At present, two key technologies of vehicle communicatio...
详细信息
暂无评论