ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Emerging Networking Architecture and Technologies: First International Conference, ICENAT 2022, Shenzhen, China, November 15–17, 2022, Proceedings

دانلود کتاب معماری و فناوری های شبکه نوظهور: اولین کنفرانس بین المللی، ICENAT 2022، شنژن، چین، 15 تا 17 نوامبر 2022، مجموعه مقالات

Emerging Networking Architecture and Technologies: First International Conference, ICENAT 2022, Shenzhen, China, November 15–17, 2022, Proceedings

مشخصات کتاب

Emerging Networking Architecture and Technologies: First International Conference, ICENAT 2022, Shenzhen, China, November 15–17, 2022, Proceedings

ویرایش:  
نویسندگان:   
سری: Communications in Computer and Information Science, 1696 
ISBN (شابک) : 9811996962, 9789811996962 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 652
[653] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 53 Mb 

قیمت کتاب (تومان) : 40,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Emerging Networking Architecture and Technologies: First International Conference, ICENAT 2022, Shenzhen, China, November 15–17, 2022, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب معماری و فناوری های شبکه نوظهور: اولین کنفرانس بین المللی، ICENAT 2022، شنژن، چین، 15 تا 17 نوامبر 2022، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب معماری و فناوری های شبکه نوظهور: اولین کنفرانس بین المللی، ICENAT 2022، شنژن، چین، 15 تا 17 نوامبر 2022، مجموعه مقالات

این کتاب مجموعه مقالات داوری اولین کنفرانس بین‌المللی معماری و فناوری‌های شبکه‌های نوظهور، ICENAT 2022 است که در شنژن، چین، در اکتبر 2022 برگزار شد.
50 مقاله ارائه‌شده به‌طور کامل بررسی و از بین 106 مقاله ارسالی انتخاب شدند. این جلد بر جدیدترین دستاوردها در زمینه فناوری‌های شبکه نوظهور تمرکز دارد که موضوعات معماری شبکه‌های نوظهور، فناوری‌های مرزی شبکه، برنامه‌های کاربردی شبکه صنعتی و غیره را پوشش می‌دهد.


توضیحاتی درمورد کتاب به خارجی

This book constitutes refereed proceedings of the First International Conference on Emerging Networking Architecture and Technologies, ICENAT 2022, held in  Shenzhen, China, in October 2022.
The 50 papers presented were thoroughly reviewed and selected from the 106 submissions. The volume focuses on the latest achievements in the field of emerging network technologies, covering the topics of emerging networking architecture, network frontier technologies, industry network applications and so on.



فهرست مطالب

Preface
Organization
Contents
Networking and the Metaverse: Challenges and Opportunities
An In-Network Computing Service Placement Mechanism for NUMA-based Software Router
	1 Introduction
	2 System Architecture
	3 Design of NUMA-ISP
	4 Experimental Results
	5 Conclusion
	References
Implementation and Deployment of Digital Twin in Cloud-Native Network
	1 Introduction
	2 Implementation of Digital Twin
		2.1 Motivation and Goal
		2.2 The Definition and Representation of Digital Twin
		2.3 Implementation and Deployment of Digital Wwins in Network
		2.4 Usage of Digital Twins in Cloud-Native Network
	3 Optimal Deployment of Digital Twin in Cloud-Native Network
		3.1 System Model and Optimization Problem Formulation
		3.2 Adaptive Deployment Algorithm of Digital Twins in Cloud-Native Network
	4 Evaluation
		4.1 Scenario and Experimental Settings
		4.2 Performance Metrics
		4.3 Experimental Results and Analysis
		4.4 Summary
	5 Conclusion
	References
Domain-Specific Programming Router Model
	1 Introduction
	2 Related Work
		2.1 White-Box Switch
		2.2 White-Box Router
		2.3 Network Domain High-Level Language Programming
	3 Domain Programming Router Model
		3.1 Domain Programming Router DPRouter Architecture
		3.2 Domain Programming Data Processor DpDPU Based on RMT
		3.3 Domain Programming Languages and Compilation Methods
		3.4 Centralized and Distributed Control Plane
		3.5 DPRouter Packet Co-processing
	4 Domain Programming Router Function Extension Method
		4.1 On-Stream Detection for Carrier Management Control
		4.2 Name Routing and Forwarding for New Carrier Services
		4.3 Zero-Trust Access Control for Carrier Security
	5 Implementation and Performance Analysis of DPRouter Prototype
		5.1 Design and Implementation of DPRouter Prototype
		5.2 Performance Testing and Analysis
	6 Conclusion and Outlook
	References
Multi-agent Deep Reinforcement Learning-based Incentive Mechanism For Computing Power Network
	1 Introduction
	2 Related Work
	3 System Model
		3.1 Utility of Users
		3.2 Utility of Resource Providers
		3.3 Utility of the Platform
	4 Game Analysis
		4.1 Problem Formulation
		4.2 Stackelberg Game
	5 Proposed MADRL Algorithm for Resource Providers
	6 Performance Evaluation
		6.1 Simulation Setup
		6.2 Simulation Results
	7 Conclusion
	References
SBR-based User Intent Extraction Mechanism for Intent-Based Network
	1 Introduction
	2 Related Work
		2.1 Intent-Based Network
		2.2 Intent Extraction
		2.3 Intent Orchestration
		2.4 Intent Confirmation
		2.5 Intent Deployment
	3 SBR-based User Intent Extraction
		3.1 Intent Extraction
		3.2 Procedure of SBR in Intent Extraction
		3.3 Experiments
	4 Results Analysis
	5 Conclusion
	References
Customizable Service Identification Method and System Design for Smart Integration Identifier Network
	1 Introduction
	2 Smart Integration Identifier Network Architecture
	3 Customizable Service Identification Method
		3.1 Application of SIH in Resource Constrained Scenarios
		3.2 Application of SIH in the Service Function Chain Scenario
		3.3 Application of SIH in Network State Awareness Scenario
	4 System Design Based on Customizable Service Identification Method
	5 Evaluation
		5.1 Functional Test Results
		5.2 Performance Results
	6 Conclusion
	References
A Dynamic Live Streaming Service Architecture Integrated Sensing and Control
	1 Introduction
	2 Related Works
		2.1 OTT Service
		2.2 Tidal Traffic of Live Streaming
		2.3 OTT Service Over Multicast
	3 System Model
		3.1 Multicast Management Platform
		3.2 Multicast Distribution Service
		3.3 Multicast Agent
		3.4 Multicast Sensing And Control
	4 Experimental Evaluation
		4.1 Experimental Networking Diagram and Hardware Configuration
		4.2 Experimental Procedure
		4.3 Experimental Result
	5 Conclusion
	References
Network Intelligence Theory and Technology
Detection of SDN Flow Rule Conflicts Based on Knowledge Graph
	1 Introduction
	2 Introduction of Flow Rule Conflicts
		2.1 Conflicts in One Flow Table
		2.2 Conflicts among Multiple Tables
	3 Method
		3.1 Design of Ontology
		3.2 Definition of Production Rules
	4 Experiment
	5 Conclusion
	References
Risk-Aware SFC Placement Method in Edge Cloud Environment
	1 Introduction
	2 Related Work
		2.1 SFC
		2.2 Prediction
	3 Method
		3.1 System Overview
		3.2 Edge Cloud Attack Prediction
		3.3 Risk-Aware Deployment
		3.4 Overall-Algorithm
	4 Evaluation
	5 Conclusion
	References
Network Traffic Identification Method Based on Temporal and Multi-scale Spatial Fusion
	1 Introduction
	2 Related Work
		2.1 Payload Based Network Traffic Identification Method
		2.2 Flow Statistical Features Based Network Traffic Identification Method
		2.3 Deep Learning Based Network Traffic Identification Method
	3 Proposed Method
		3.1 Overall Architecture
		3.2 Data Preprocessing
		3.3 Spatial Feature Extraction of Network Traffic
		3.4 Temporal Feature Extraction of Network Traffic
	4 Evaluation
		4.1 Dataset
		4.2 Metrics
		4.3 Comparison Algorithm
		4.4 Experiments
	5 Conclusion
	References
A Trustworthy Content Moderation Scheme Based on Permissioned Blockchain
	1 Introduction
	2 Related Work
	3 Proposed Scheme
		3.1 Participants of the Blockchain
		3.2 Transaction Formats
		3.3 Transaction Procedure Based on Blockchain
		3.4 Content Moderation Service Mechanism
	4 Experimental Environment and Trail System
	5 Performance Evaluation
		5.1 Latency Performance Evaluation
		5.2 Computational Overhead Evaluation
	6 Conclusion and Future Work
	References
Multi-agent Deep Reinforcement Learning-Based Content Caching in Cache-Enabled Networks
	1 Introduction
	2 System Model
		2.1 Model Building
		2.2 Problem Transformation
		2.3 MADDPG-Based Cooperative Caching Algorithm
	3 Simulation Experiments
		3.1 Experimental Simulation Environment
		3.2 Experimental Results
	4 Conclusion
	References
Heterogeneous Networks and Network Integration
Mutual Authentication Protocol in a Distributed Heterogeneous Environment: A Blockchain-Based Approach
	1 Introduction
	2 Related Work
	3 Background
		3.1 Bilinear Pairings
		3.2 Lagrange Interpolation Polynomial
	4 Identity-Based Authentication Protocol
		4.1 Initialization
		4.2 Key Generation for Authorized Nodes
		4.3 Key Generation for Users
		4.4 Authentication
	5 Mutual Authentication Protocol in Heterogeneous Environment
		5.1 Initialization
		5.2 Key Generation for Authorized Nodes
		5.3 Key Generation for Users
		5.4 Authentication
	6 Security and Performance Analysis
		6.1 Security Analysis
		6.2 Performance Analysis
	7 Conclusion
	References
Performance Evaluation of Transmission Protocols Based on Satellite Networks
	1 Introduction
	2 Transmission Protocols
		2.1 TCP Reno
		2.2 TCP NewReno
		2.3 TCP Bic
		2.4 TCP Cubic
		2.5 TCP Westwood
		2.6 TCP Vegas
		2.7 TCP BBR
		2.8 QUIC
	3 Testbed and Experiment
	4 Conclusion
	References
Optimizing Communication Topology for Collaborative Learning Across Datacenters
	1 Introduction
	2 Background and Motivation
		2.1 Communication in Cross-Silo Federated Learning
		2.2 Related Work and Their Limitations
	3 TopoAdopt: Communication Topology and Parameter Distribution Optimization
		3.1 Design Overview
		3.2 Problem Formulation
		3.3 Algorithm Design
	4 Performance Evaluation
		4.1 Methodology
		4.2 Experimental Results
	5 Conclusion
	References
Design of Reliable Parallel Transmission System in Complex Heterogeneous Network
	1 Introduction
	2 Related Work
	3 Introduction to Parallel Transmission System
		3.1 Connection Management Module
		3.2 Transceiver Management Module
		3.3 Link State Detection Module
		3.4 Link State Classification Module
	4 Design of Cache Sorting Mechanism
	5 A Reliable Scheduling Scheme for Parallel Transmission
	6 Comparative Testing
		6.1 The Out-of-Order Degree Test of the Data Packets at the Receiving End
		6.2 Bandwidth Comparison Test
	7 Conclusion
	References
Design of Privacy-Preserving in Multi-link Vehicle-Ground Communication
	1 Introduction
	2 Related Work
		2.1 Privacy-Preserving in Vehicle-Ground Communication
		2.2 Link Padding
		2.3 Multi-path Anonymity Technology
	3 The Introduction of Privacy-Preserving in Multi-link Vehicle-Ground Communication System
		3.1 Data Encryption and Authentication
		3.2 Link Perception
		3.3 Fragmentation and Reorganization
		3.4 Virtual Packet Construction and Sending
	4 Authentication Mechanism
		4.1 System Initialization
		4.2 Register to Get Private Key
		4.3 Authentication Communication
	5 Fragmentation Reorganization Mechanism
		5.1 Fragment
		5.2 Reorganization
	6 Experiment
		6.1 Authentication Mechanism Comparison Test
		6.2 Fragmentation Reorganization Mechanism Comparison Test
	7 Conclusion
	References
Smart Mobile Router Wireless Heterogeneous Network Access Mechanism
	1 Introduction
	2 Related Work
	3 System Introduction
		3.1 Hardware Adaptation Module
		3.2 Data Storage Module
		3.3 Resource Awareness and Management Module
		3.4 Network Access and Processing Module
	4 Network Selection Strategy
	5 Functional Test
	6 Conclusion
	References
A Comparative Study on Routing Convergence of IP-Based and ICN-Based Routing Protocols in Satellite Networks
	1 Introduction
	2 Literature Review
	3 Preliminaries for Satellite Networks
		3.1 Polar Satellite Constellation
		3.2 Duration of a Stable Topology
	4 Comparison Between IP-Based and ICN-Based Routing Mechanisms
		4.1 Link-State Detection
		4.2 Synchronization of Link-State
	5 Performance Evaluation
		5.1 Simulation Setup
		5.2 Duration of a Stable Topology
		5.3 Routing Convergence and Messaging Overhead
	6 Conclusion
	References
Subarea Route Fusion Mechanism Based on Virtual Links
	1 Introduction
	2 Related Work
	3 Virtual Link-Based Sub-area Route Fusion Model
		3.1 A Subsection Sample
		3.2 Inter-area Routing Design Within IAs
	4 The Optimal Establishing Method for Virtual Links
		4.1 Optimization of Global Traffic Cost
		4.2 Optimization of Links Without Backups
	5 Experimental Analysis
		5.1 Optimization Capability Analysis of a Single Virtual Link
		5.2 Optimization Capability of Multiple Virtual Links
		5.3 Experiment with Real Equipment
	6 Conclusion
	References
Secure Network Slicing Scheme with Signature Authentication and User Trust
	1 Introduction
	2 Related Works
	3 SINET Access RESTful API Signature Authentication
		3.1 RESTful API Introduction
		3.2 RESTful API Design
		3.3 Security Functions
	4 Design of Trust and Access Decision
		4.1 Calculation of User Trust
		4.2 Access Decision Module
		4.3 Security Functions
	5 Simulation
		5.1 Experimental Environment
		5.2 Signature Authentication Security Test
		5.3 Access Decision Test Based on Trust
		5.4 Scheme Performance Test
	6 Conclusion
	References
Network Service Quality Assurance and Security
Online Hybrid Kernel Learning Machine with Dynamic Forgetting Mechanism
	1 Introduction
	2 DAE-DFOS-HKELM
		2.1 Hybird Kernel Function
		2.2 Dynamic Forgetting Mechanism
		2.3 Building DAE-DFOS-HKELM Algorithm
	3 Experiments
	4 Conclusion
	References
TraCGAN: An Efficient Traffic Classification Framework Based on Semi-supervised Learning with Deep Conventional Generative Adversarial Network
	1 Introduction
	2 State of Art
		2.1 Traffic Classification
		2.2 ML and DL-Based Approach of Traffic Classification
	3 Generative Adversarial Network
		3.1 GAN
		3.2 Semi-surpervised Learning Based on GAN
	4 The Proposed Method TraCGAN
		4.1 The Workflow of TraCGAN
		4.2 Details of TraCGAN Structure
	5 Experimental Results
		5.1 Description of Open Source Datasets
		5.2 Discussion About Experiment Results
	6 Conclusion
	References
Brief Analysis for Network Security Issues in Computing Power Network
	1 Introduction
	2 Analysis of Computing Power Network Security
		2.1 Computing Power Infrastructure Security
		2.2 Network Facility Security
		2.3 Arranging and Scheduling Security
		2.4 Operation Service Security
		2.5 Data Security
	3 Atomic Security Capability in Computing Power Network
	4 Secure and Credible Computing Network Service
		4.1 Building Enterprise Security Capability Framework (IPDRR) Based on Computing Power Network
		4.2 New Security Concept of Computing Power Network
	5 Conclusion
	References
In-Band Networking and Fault Adjustment Mechanism of SDN System Based on ONOS and P4
	1 Introduce
	2 Related Works
	3 In-Band Networking Mechanism and Fault Adjustment Method System Design
		3.1 System Introduce
		3.2 Module Analysis
		3.3 Operation Process
	4 In-Band Networking Mechanism and Fault Adjustment Method Implementation
		4.1 In-Band Networking Mechanism Implementation
		4.2 In-Band Network Fault Adjustment Method Implementation
	5 Simulation
		5.1 Simulation Environment
		5.2 Comparison of Algorithms
		5.3 Comparison of Fault Adjustment Convergence Time
	6 Conclusion
	References
CNN-CGAN: A New Approach for Intrusion Detection Based on Generative Adversarial Networks
	1 Introduction
	2 Related Works
	3 Methods
		3.1 Data Processing
		3.2 Model Training
	4 Experiments
		4.1 Metrics of Performance Evaluation
		4.2 Dataset
		4.3 Model Performance Comparison
	5 Conclusion
	References
A Lattice-Based Multisignature Scheme for Blockchain-Enabled Systems
	1 Introduction
	2 Related Work
	3 Preliminaries
		3.1 Lattices and Notation
		3.2 Multisignature Scheme
		3.3 Blockchain Technology
	4 Proposed Scheme
		4.1 Our Multisignature Scheme
		4.2 Correctness and Security Analysis
		4.3 An Application in Blockchain Systems
	5 Performance Evaluation
	6 Conclusion
	References
Improvement of AFL\'s Seed Deterministic Mutation Algorithm
	1 Introduction
	2 Background
		2.1 Fuzzing Test
		2.2 American Fuzzy Loop (AFL)
	3 Method
		3.1 Deterministic Mutation
		3.2 Non-deterministic Mutation
	4 Evaluation
	5 Future Work
	6 Conclusion
	References
Active Detection Path Planning Algorithm and Implementation for SFC Fault Detection
	1 Introduce
	2 Related Works
	3 System Model and Problem Formulation
	4 Path Planning Algorithm Design
	5 Experimental Simulation and Performance Analysis
		5.1 SFC State Active Awareness Performance Test
	6 Conclusion
	References
A Super-Nash Equilibrium Defense Solution for Client-Side Cache Poisoning Attacks
	1 Introduction
	2 Related Work
	3 System Description and Modeling
		3.1 Threat Model
		3.2 System Overview
		3.3 Scene Modeling
	4 Intelligent Reinforcement Learning Algorithms
		4.1 The Overall Framework
		4.2 Algorithm Convergence Under Dual Prediction
	5 Experiment
		5.1 Experimental Environment and Parameter Settings
		5.2 Convergence Experiment
		5.3 Effect in Simulation Environment
	6 Summary and Outlook
	References
Optimization of TCP Congestion Control Algorithms Loss-Based in Wireless Network
	1 Introduction
	2 Loss-Based Congestion Control Algorithms
		2.1 TCP NewReno
		2.2 TCP CUBIC
	3 Background and Motivation
		3.1 Wireless Access
		3.2 Motivation
	4 Proposed Method
		4.1 Implementation
		4.2 Fairness Analysis
	5 Simulation and Experiment
		5.1 Simulation in NS3
		5.2 Simulation in Real Network
	6 Conclusion
	References
Priority-Aware Deployment of Multi-objective Service Function Chains
	1 Introduction
	2 Related Work
	3 Problem Formulation
		3.1 Network Model
		3.2 SFC Request Model
		3.3 Mapping Relationship
		3.4 SFC Deployment Problem Formulation
	4 Proposed Algorithm
		4.1 Agent Design
		4.2 Deep Reinforcement Learning Method with Prioritization (ASPD)
	5 Evaluation and Analysis
		5.1 Simulation Setup
		5.2 Performance Evaluation
	6 Conclusion
	References
Network Link Status Classification Method Based on Graph Autoencoder
	1 Introduction
	2 Related Work
	3 Link Status Prediction Method Based on Graph Autoencoder
		3.1 Overall Architecture
		3.2 Node Feature Extraction Module
		3.3 Link Status Classification Module
		3.4 Link Status Evaluation Model
	4 Experiments
		4.1 Datasets
		4.2 Compare Algorithm and Evaluation Index
		4.3 Simulation Results
	5 Conclusion
	References
Deployment of Asynchronous Traffic Shapers in Data Center Networks
	1 Introduction
	2 Related Work
		2.1 Synchronous Scheme
		2.2 Asynchronous Scheme
	3 Detailed Design
		3.1 Design Overview
		3.2 Parser—Multi-stage Pipeline
		3.3 Buffers —Shaping Queues, Shared Queues
		3.4 Interleaving Shaping Algorithm
	4 Evaluation
		4.1 Theoretical Single-Hop Time Latency
		4.2 Experimental Design
		4.3 Experimental Results
	5 Conclusion
	References
An Efficient Firewall Application Using Learned Cuckoo Filter
	1 Introduction
	2 System Design
	3 Packet Classification Algorithm Design
		3.1 Structure of Proposed Algorithm
		3.2 Rule Insection Algorithm
		3.3 Packet Classification Algorithm
		3.4 Theoretical Analyze
	4 Experimental Results
		4.1 Experiment Setup
		4.2 Performance Evaluation
	5 Conclusion
	References
A Framework of Intrusion Detection Inspired by Artificial Immune System
	1 Introduction
	2 Preliminaries
		2.1 Basic Negative Selection Algorithm Used in AIS
		2.2 The Workflow of Basic Negative Selection Algorithm Used in AIS
		2.3 Intrusion Detection Systems Based on AIS
	3 Optimized Adaptive Gene Intrusion Detection System
		3.1 The Framework of Optimized Intrusion Detection System Based on AIS
		3.2 The Workflow of Basic Negative Selection Algorithm Used in AIS
	4 Experimental Results
		4.1 Description of Open Source Datasets
		4.2 Discussion About Experiment Result
	5 Conclusion
	References
Hop-by-Hop Verification Mechanism of Packet Forwarding Path Oriented to Programmable Data Plane
	1 Introduction
	2 Related Work
	3 System Model
		3.1 SDN and P4
		3.2 Basic Assumptions
		3.3 Attacker Model
	4 Design
		4.1 OverView
		4.2 Control Plane: Identity Verification Module and Key Management Module
		4.3 Data Plane: Identity Generation
		4.4 Verification Process
	5 Security Analysis
	6 Simulation and Analysis
		6.1 Forwarding Delay
		6.2 Throughput
		6.3 Goodput Ratio
	7 Conclusion
	References
A Reconfigurable and Dynamic Access Control Model in the Programmable Data Plane
	1 Introduction
	2 System Model
	3 Dynamic Request Access Control
	4 Evaluation
		4.1 Experiment Setup
		4.2 Results
	5 Conclusion
	References
A Correlation Analysis-Based Mobile Core Network KPI Anomaly Detection Method via Ensemble Learning
	1 Introduction
	2 Related Work
		2.1 Statistical-Based Anomaly Detection Methods
		2.2 Machine Learning-Based Anomaly Detection Methods
		2.3 Deep Learning-Based Anomaly Detection Methods
	3 Method
		3.1 Data Collection Module
		3.2 Data Pre-processing Module
		3.3 Anomaly Detection Module
	4 Dataset
		4.1 Dataset Overview
		4.2 Waveform Analysis
	5 Experimental Results
		5.1 Experimental Environment
		5.2 Comparative Analysis of Experimental Results
	6 Conclusion
	References
An Efficient BGP Anomaly Detection Scheme with Hybrid Graph Features
	1 Introduction
	2 Related Works
	3 BGP Anomaly Considerations
	4 Proposed Methodology
		4.1 Hybrid Graph Feature Extraction
		4.2 Efficient Anomaly Detection
	5 Evaluation
		5.1 Experiment Setup
		5.2 Performance of Different Features
		5.3 Performance of Lightweight Detection Models
	6 Conclusion
	References
Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
	1 Introduction
	2 Related Works
	3 CTI Knowledge Graph
		3.1 CTI Knowledge Graph Construction Method
		3.2 CTI Ontology Construction
	4 Generating Defense Strategy Based on CTI Knowledge Graph
		4.1 Cti-Kge
		4.2 Reasoning Rules for Defense Strategy
	5 Experiment
		5.1 Evaluation of CTI-KGE
		5.2 Case Study of Defense Strategy Generation
	6 Conclusion
	References
A Computing Efficient Algorithm Specialized for Pseudo-Constant Metrics
	1 Introduction
	2 Motivation and Basic Idea
		2.1 Motivation
		2.2 Basic Idea of BMD
	3 Binary Mixed Detection and Model Evaluation
		3.1 BMD Algorithm
		3.2 Model BMD
	4 Probability of False Positive and False Negative
		4.1 False Positive
		4.2 False Negative
		4.3 Numerical Result
	5 Experimental Results
	6 Conclusion
	References
Research and Implementation of Cycle Control Technology for Time Sensitive Networking
	1 Introduction
	2 Background
	3 Problem Description
	4 Cycle Synchronization Algorithm
		4.1 Algorithm Description
		4.2 Algorithm Performance Analysis
	5 Experiment
		5.1 Setup
		5.2 Experiment Results
	6 Related Work
	7 Conclusion
	References
Network Traffic Classification Based on LSTM+CNN and Attention Mechanism
	1 Introduction
		1.1 Background and Problem
		1.2 Related Research
	2 DataSet
		2.1 Data Analysis
		2.2 Data Processing
	3 CNN+LSTM Classification Model
		3.1 Sub-model I: CNN for Data Imbalance Problem
		3.2 Sub-model II: LSTM for Temporal Correlation Problem
		3.3 Overall Model CNN + LSTM and Classification Steps
	4 Experiment
		4.1 Evaluation Metrics
		4.2 Experiment I: Data Augment Performance
		4.3 Experiment II: Squeeze and Excitation Performance
		4.4 Experiment III: Overall Model Performance
	5 Conclusion
	References
CQCF: A Cyclic Queuing Cluster Forwarding Based Transmission Mechanism for Large-Scale Deterministic Network
	1 Introduction
	2 Related Works
	3 Architecture and Working Flow of CQCF
		3.1 The Architecture of CQCF
		3.2 Routing and Forwarding of CQCF
		3.3 Cross-Domain Transfer of CQF and CQCF
	4 Algorithm Design of CQCF
		4.1 Mapping Principle of Cycle and Hypercycle
		4.2 Scheduling Constraints of CQCF
		4.3 The Design of Algorithm
	5 Simulation
		5.1 Experimental Environment
		5.2 Analysis of Results
	6 Conclusion
	References
Information Centric Networking (ICN)
A Task-Resource Joint Optimization Model in Distributed Computing
	1 Introduction
	2 Related Work
	3 System Model
	4 Algorithm Design
	5 Numerical Experiment
	6 Conclusion
	References
Cache Strategy for Information Center Satellite Networks Based on Node Importance
	1 Introduction
	2 Related Work
	3 System Model
	4 Method
		4.1 Node Importance Index
		4.2 Cache Node Selection
		4.3 Caching Strategy
	5 Experiment
		5.1 Parameter Setting
		5.2 Evaluation Metrics
		5.3 Experiment Results
	6 Conclusion
	References
Intelligent Online Traffic Optimization Based on Deep Reinforcement Learning for Information-Centric Networks
	1 Introduction
	2 Related Work and Motivations
	3 The Network Model and the Intelligent Online Traffic Optimization System
		3.1 The Network Model
		3.2 The Intelligent Online Traffic Optimization System
		3.3 The Intelligent Online Traffic Optimization Scheme
	4 The Performance Evaluation
		4.1 Simulation Settings
		4.2 Simulation Results
	5 Conclusion
	References
Detection and Defense Schemes for Cache Pollution Attack in Content-Centric Network
	1 Introduction
	2 Related Work
	3 System Design
	4 Detection and Defense Schemes
		4.1 Characteristic Parameter Calculation
		4.2 Detection Scheme
		4.3 Defense Scheme
	5 Simulation and Analysis
		5.1 Simulation Environment
		5.2 Evaluation Indicators
		5.3 Cache Pollution Attack Detection Experiment and Analysis
	6 Conclusion
	References
SPOF-NDN: A POF-Based NDN Forwarding Scheme
	1 Introduction
	2 Background
		2.1 Protocol-Oblivious Forwarding
		2.2 Named Data Networking
	3 SPOF-NDN Design
		3.1 SPOF-NDN Packet and Header Processor
		3.2 Data Plane
		3.3 Control Plane
	4 Evaluation
	5 Conclusion
	References
Author Index




نظرات کاربران