Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (155)
  • Open Access

    ARTICLE

    A Multi-Constraint Path Optimization Scheme Based on Information Fusion in Software Defined Network

    Jinlin Xu1,2, Wansu Pan1,*, Longle Cheng1,2, Haibo Tan1,2, Munan Yuan1,*, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1399-1418, 2024, DOI:10.32604/cmc.2024.049622

    Abstract The existing multipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is a lack of cooperation between the terminal and network sides, making it difficult to achieve dynamic adaptation of service requirements and network resources. To address these issues, we propose a multi-constraint path optimization scheme based on information fusion in SDN. The proposed scheme collects network topology and network state information on the network side and computes disjoint paths between end hosts. It uses the Fuzzy Analytic Hierarchy Process (FAHP) to calculate the weight coefficients of multiple constrained parameters and constructs a composite quality… More >

  • Open Access

    ARTICLE

    Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches

    Jiajun Yan, Ying Zhou*, Anchen Dai, Tao Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 563-580, 2024, DOI:10.32604/cmc.2024.048922

    Abstract As an emerging network paradigm, the software-defined network (SDN) finds extensive application in areas such as smart grids, the Internet of Things (IoT), and edge computing. The forwarding layer in software-defined networks is susceptible to eavesdropping attacks. Route hopping is a moving target defense (MTD) technology that is frequently employed to resist eavesdropping attacks. In the traditional route hopping technology, both request and reply packets use the same hopping path. If an eavesdropping attacker monitors the nodes along this path, the risk of 100% data leakage becomes substantial. In this paper, we present an effective route hopping approach, called two-day… More >

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order… More >

  • Open Access

    REVIEW

    Carbon Monoxide Modulates Auxin Transport and Nitric Oxide Signaling in Plants under Iron Deficiency Stress

    Kaiyue Hong1,2, Yasmina Radani2, Waqas Ahmad2, Ping Li3, Yuming Luo1,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.1, pp. 45-61, 2024, DOI:10.32604/phyton.2023.046389

    Abstract Carbon monoxide (CO) and nitric oxide (NO) are signal molecules that enhance plant adaptation to environmental stimuli. Auxin is an essential phytohormone for plant growth and development. CO and NO play crucial roles in modulating the plant’s response to iron deficiency. Iron deficiency leads to an increase in the activity of heme oxygenase (HO) and the subsequent generation of CO. Additionally, it alters the polar subcellular distribution of Pin-Formed 1 (PIN1) proteins, resulting in enhanced auxin transport. This alteration, in turn, leads to an increase in NO accumulation. Furthermore, iron deficiency enhances the activity of ferric chelate reductase (FCR), as… More >

  • Open Access

    ARTICLE

    The Effect of Soil Enzymes and Polysaccharides Secreted by the Roots of Salvia miltiorrhiza Bunge under Drought, High Temperature, and Nitrogen and Phosphorus Deficits

    Yong Qin1,2, Xiaoyu Li1,2, Yanhong Wu1,2, Hai Wang3, Guiqi Han1,2,3, Zhuyun Yan1,2,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.1, pp. 119-135, 2024, DOI:10.32604/phyton.2023.046075

    Abstract Root exudates serve as crucial mediators for information exchange between plants and soil, and are an important evolutionary mechanism for plants’ adaptation to environmental changes. In this study, 15 different abiotic stress models were established using various stress factors, including drought (D), high temperature (T), nitrogen deficiency (N), phosphorus deficiency (P), and their combinations. We investigated their effects on the seedling growth of Salvia miltiorrhiza Bunge and the activities of Solid-Urease (S-UE), Solid-Nitrite Reductase (S-NiR), Solid-Nitrate Reductase (S-NR), Solid-Phosphotransferase (S-PT), and Solid-Catalase (S-CAT), as well as the contents of polysaccharides in the culture medium. The results showed that the growth… More >

  • Open Access

    REVIEW

    A Review on the Security of the Ethereum-Based DeFi Ecosystem

    Yue Xue1, Dunqiu Fan2, Shen Su1,3,*, Jialu Fu1, Ning Hu1, Wenmao Liu2, Zhihong Tian1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 69-101, 2024, DOI:10.32604/cmes.2023.031488

    Abstract Decentralized finance (DeFi) is a general term for a series of financial products and services. It is based on blockchain technology and has attracted people’s attention because of its open, transparent, and intermediary free. Among them, the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention. However, the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years. Herein, we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues. To that end, we investigate the Ethereum-based DeFi security issues: 1)… More >

  • Open Access

    ARTICLE

    Deployment Strategy for Multiple Controllers Based on the Aviation On-Board Software-Defined Data Link Network

    Yuting Zhu1, Yanfang Fu2,*, Yang Ce3, Pan Deng1, Jianpeng Zhu1, Huankun Su1

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3867-3894, 2023, DOI:10.32604/cmc.2023.046772

    Abstract In light of the escalating demand and intricacy of services in contemporary terrestrial, maritime, and aerial combat operations, there is a compelling need for enhanced service quality and efficiency in airborne cluster communication networks. Software-Defined Networking (SDN) proffers a viable solution for the multifaceted task of cooperative communication transmission and management across different operational domains within complex combat contexts, due to its intrinsic ability to flexibly allocate and centrally administer network resources. This study pivots around the optimization of SDN controller deployment within airborne data link clusters. A collaborative multi-controller architecture predicated on airborne data link clusters is thus proposed.… More >

  • Open Access

    ARTICLE

    Different Deficit Irrigation Lower Limits and Irrigation Quotas Affect the Yield and Water Use Efficiency of Winter Wheat by Regulating Photosynthetic Characteristics

    Huiqin Li, Mingzhi Zhang*, Na Xiao, Haijian Yang

    Phyton-International Journal of Experimental Botany, Vol.92, No.12, pp. 3211-3236, 2023, DOI:10.32604/phyton.2023.031003

    Abstract To determine suitable thresholds for deficit irrigation of winter wheat in the well-irrigated area of the Huang-Huai-Hai Plain, we investigated the effects of different deficit irrigation lower limits and quotas on the photosynthetic characteristics and grain yield of winter wheat. Four irrigation lower limits were set for initiating irrigation (i.e., light drought (LD, 50%, 55%, 60% and 50% of field holding capacity (FC) at the seedling-regreening, jointing, heading and filling-ripening stages, respectively), medium drought (MD, 40%, 50%, 55% and 45% of FC at the same stages, respectively), adequate moisture (CK1, 60%, 65%, 70% and 60% of FC at the same… More >

  • Open Access

    REVIEW

    Reservoir of human immunodeficiency virus in the brain: New insights into the role of T cells

    YINGDONG ZHANG1,2, MING CHU1,2,*, HONGZHOU LU3,*

    BIOCELL, Vol.47, No.12, pp. 2591-2595, 2023, DOI:10.32604/biocell.2023.030331

    Abstract Human immunodeficiency virus (HIV) infection of the central nervous system (CNS) has attracted significant attention because it contributes to severe complications of acquired immunodeficiency syndrome (AIDS) and seriously impairs the life quality of infected patients. In this review, we briefly describe the latent infection of HIV in CNS and focus on the role of the important immune cells, such as T cells, in the formation and maintenance of the HIV reservoir in CNS. This review explores the mechanisms by which T cells enter CNS and establish latent infection of HIV in the CNS. In conclusion, we summarize the role of… More > Graphic Abstract

    Reservoir of human immunodeficiency virus in the brain: New insights into the role of T cells

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can classify the DDoS attack traffic… More >

Displaying 1-10 on page 1 of 155. Per Page