Intrusion detection for IP networks has been a research theme for a number of years already. One of the challenges is to keep up with the ever increasing Internet usage and network...
This paper proposes an optimization method for the design of large scale confederation based BGP networks. We propose a graph based model and an associated metric to evaluate the r...
Peer-to-peer overlay networks provide a useful infrastructure for building distributed applications. These networks provide efficient and fault-tolerant routing and object locating...
Seyed Iman Mirrezaei, Javad Shahparian, Mohammad G...
Different kinds of malware like the botnets and the worms are a main threat on Internet for the current and future. Their efficiency to control systems is proved and we are invest...
This paper presents a new idea for the management of lambda-connections in optical networks. The idea consists of making multi-service optical switches responsible for automaticall...
This paper describes a novel approach to network management topologies where multiple customized topologies are self-configured, self-optimized, and maintained automatically by the...
Liam Fallon, Daryl Parker, Martin Zach, Markus Lei...
Optical or lambda exchanges have emerged to interconnect networks, providing dynamic switching capabilities on OSI layer 1 and layer 2. So far, the only inter-domain dynamics have ...
Freek Dijkstra, Bas van Oudenaarde, Bert Andree, L...
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...