5,600 research outputs found
Computer Networks Security Models - A New Approach for Denial-of-Services Attacks Mitigation
Computer networks are a critical factor for the performance of a
modern company. Managing networks is as important as managing any other
aspect of the company’s performance and security. There are many tools and
appliances for monitoring the traffic and analyzing the network flow security.
They use different approaches and rely on a variety of characteristics of the
network flows. Network researchers are still working on a common approach
for security baselining that might enable early watch alerts. This research
focuses on the network security models, particularly the Denial-of-Services
(DoS) attacks mitigation, based on a network flow analysis using the flows
measurements and the theory of Markov models. The content of the paper
comprises the essentials of the author’s doctoral thesis
Recommended from our members
Design for Additive Manufacturing: A Method to Explore Unexplored Regions of the Design Space
Additive Manufacturing (AM) technologies enable the fabrication of parts and devices that
are geometrically complex, have graded material compositions, and can be customized. To take
advantage of these capabilities, it is important to assist designers in exploring unexplored regions
of design spaces. We present a Design for Additive Manufacturing (DFAM) method that
encompasses conceptual design, process selection, later design stages, and design for
manufacturing. The method is based on the process-structure-property-behavior model that is
common in the materials design literature. A prototype CAD system is presented that embodies
the method. Manufacturable ELements (MELs) are proposed as an intermediate representation
for supporting the manufacturing related aspects of the method. Examples of cellular materials
are used to illustrate the DFAM method.Mechanical Engineerin
- …