GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Hindawi Limited  (4)
  • Man, Dapeng  (4)
  • English  (4)
Material
Publisher
  • Hindawi Limited  (4)
Language
  • English  (4)
Years
  • 1
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Wireless Communications and Mobile Computing Vol. 2021 ( 2021-9-14), p. 1-13
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2021 ( 2021-9-14), p. 1-13
    Abstract: Information-Centric Networking with caching is a very promising future network architecture. The research on its cache deployment strategy is divided into three categories, namely, noncooperative cache, explicit collaboration cache, and implicit collaboration cache. Noncooperative caching can cause problems such as high content repetition rate in the web cache space. Explicit collaboration caching generally reflects the best caching effect but requires a lot of communication to satisfy the exchange of cache node information and depends on the controller to perform the calculation. On this basis, implicit cooperative caching can reduce the information exchange and calculation between cache nodes while maintaining a good caching effect. Therefore, this paper proposes an on-path implicit cooperative cache deployment method based on the dynamic LRU-K cache replacement strategy. This method evaluates the cache nodes based on their network location and state and selects the node with the best state value on the transmission path for caching. Each request will only select one or two nodes for caching on the request path to reduce the redundancy of the data. Simulation experiments show that the cache deployment method based on the state and location of the cache node can improve the hit rate and reduce the average request length.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-6-15), p. 1-10
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-6-15), p. 1-10
    Abstract: There is a new cache pollution attack in the information-centric network (ICN), which fills the router cache by sending a large number of requests for nonpopular content. This attack will severely reduce the router cache hit rate. Therefore, the detection of cache pollution attacks is also an urgent problem in the current information center network. In the existing research on the problem of cache pollution detection, most of the methods of manually setting the threshold are used for cache pollution detection. The accuracy of the detection result depends on the threshold setting, and the adaptability to different network environments is weak. In order to improve the accuracy of cache pollution detection and adaptability to different network environments, this paper proposes a detection algorithm based on gradient boost decision tree (GBDT), which can obtain cache pollution detection through model learning. Method. In feature selection, the algorithm uses two features based on node status and path information as model input, which improves the accuracy of the method. This paper proves the improvement of the detection accuracy of this method through comparative experiments.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Wireless Communications and Mobile Computing Vol. 2022 ( 2022-8-11), p. 1-12
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-8-11), p. 1-12
    Abstract: Ubiquitous caching is a feature shared by all proposed information-centric network (ICN) architectures. Prioritising storage resources to popular content in the network is a proven way to guarantee hit rates, reduce the number of hops forwarded, and reduce user request latency. An ideal ICN caching mechanism should make the best use of relevant information such as content information, network state, and user requirements to achieve optimal selection and have the ability to adaptively adjust the decision cache content for dynamic scenarios. Since router nodes have limited cache space, it is then useless to accurately predict the popularity of the content with very low popularity, as this content has no chance of being cached. A more effective approach is to focus on content with high popularity that influences caching decisions. As for different nodes, they have different sets of popular content, and using this property, this paper designs a caching method based on the popularity hierarchy with topological weights. The method considers managing the cached content in nodes with a hierarchy of popularity and improving their distribution in terms of the importance of the nodes’ position in the network. Finally, the scheme is simulated by changing the parameter settings under different actual topologies on the simulation platform to confirm the feasibility of the scheme.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-10-5), p. 1-11
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-10-5), p. 1-11
    Abstract: As an innovative strategy, edge computing has been considered a viable option to address the limitations of cloud computing in supporting the Internet-of-Things applications. However, due to the instability of the network and the increase of the attack surfaces, the security in edge-assisted IoT needs to be better guaranteed. In this paper, we propose an intelligent intrusion detection mechanism, FedACNN, which completes the intrusion detection task by assisting the deep learning model CNN through the federated learning mechanism. In order to alleviate the communication delay limit of federal learning, we innovatively integrate the attention mechanism, and the FedACNN can achieve ideal accuracy with a 50% reduction of communication rounds.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...