UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2
hits: 13
1.
  • Performance Evaluation of Fuzzy Integrated Firewall Model for Hybrid Cloud based on Packet Utilization
    Rahman, Ziaur; Asma Islam Swapna; Habibur Rahman Habib ... arXiv.org, 06/2020
    Paper, Journal Article
    Open access

    Cloud computing is one of the highly flexible, confidential and easily accessible medium of platforms and provides powerful service for sharing information over the Internet. Cloud security has ...
Full text
2.
Full text

PDF
3.
Full text

PDF
4.
  • Security analysis of IEEE 802.21 standard in software defined wireless networking
    Swapna, Asma Islam; Islam, Nazrul 2017 20th International Conference of Computer and Information Technology (ICCIT), 2017-Dec.
    Conference Proceeding

    Software Defined Networking (SDN) is the best choice in establishing a software controlled inter-domain network. Convergence of different Wireless link technologies bring the mobile users to choose ...
Full text
5.
  • Policy Controlled Multi-domain cloud-network Slice Orchestration Strategy based on Reinforcement Learning
    Swapna, Asma Islam; Rosa, Raphael Vicente; Rothenberg, Christian Esteve ... 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2020-Nov.-10
    Conference Proceeding

    The concept of network slicing plays a thriving role as 5G rolls out business models vouched by different stakeholders. The dynamic and variable characterization of end-to-end cloud-network slices ...
Full text
6.
  • Towards A Marketplace for Multi-domain Cloud Network Slicing: Use Cases
    Swapna, Asma Islam; Rosa, Raphael Vicente; Rothenberg, Christian Esteve ... 2019 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2019-Sept.
    Conference Proceeding

    Dynamic end-to-end cloud network slices following a Slice-as-a-Service (SaaS) paradigm offer promising opportunities in support of diverse vertical industries attached to different administrative ...
Full text
7.
  • Comparative security analysis of software defined wireless networking (SDWN)-BGP and NETCONF protocols
    Swapna, Asma Islam; Huda, Md Rezaul; Aion, Mainul Kabir 2016 19th International Conference on Computer and Information Technology (ICCIT), 2016-Dec.
    Conference Proceeding

    Software Defined Networking (SDN) is getting much attention for larger network implementation adding programmable feature in the network plane. Demand of wireless networking features is growing ...
Full text
8.
  • Performance evaluation of f... Performance evaluation of fuzzy integrated firewall model for hybrid cloud based on packet utilization
    Swapna, Asma Islam; Rahman, Ziaur; Rahman, Md Habibur ... 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI), 2016-Oct.
    Conference Proceeding
    Open access

    Cloud computing is one of the highly flexible, confidential and easily accessible medium of platforms and provides powerful service for sharing information over the Internet. Cloud security has ...
Full text

PDF
9.
  • A Marketplace-based Approach to Cloud Network Slice Composition Across Multiple Domains
    Maciel, Paulo D.; Verdi, Fabio L.; Valsamas, Polychronis ... 2019 IEEE Conference on Network Softwarization (NetSoft), 2019-June
    Conference Proceeding
    Open access

    Cloud network slicing can be defined as the process that enables isolated end-to-end and on-demand networking abstractions, which: (a) contain both cloud and network resources, and (b) are ...
Full text

PDF
10.
  • Security analysis of softwa... Security analysis of software defined wireless network monitoring with sFlow and FlowVisor
    Swapna, Asma Islam; Reza, Md Rezaul Huda; Aion, Mainul Kabir 2016 International Conference on Communication and Electronics Systems (ICCES), 2016-Oct.
    Conference Proceeding

    Today's mobile and wireless network are growing faster in size and complex to measure the services. Security is one of the most important aspects for such complex network and needs to be monitored ...
Full text
1 2
hits: 13

Load filters