An Authentication Process for End to End Delay in the Malicious Network using Alert Correlation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

JEJUNAL EVERSION MUCOSECTOMY AND INVAGINATION: AN INNOVATIVE TECHNIQUE FOR THE END TO END PANCREATICOJEJUNOSTOMY

 ABSTRACT Background: The pancreatojejunostomy has notoriously been known to carry a high rate of operative complications, morbidity and mortality, mainly due to anastomotic leak and ensuing septic complications. Objective: In order to decrease anastomotic leak and its attendant morbidity and mortality in operations requiring a pancreato-jejunal anastomosis, and also in order to simplify the op...

متن کامل

Comprehensive end-to-end test for intensity-modulated radiation therapy for nasopharyngeal carcinoma using an anthropomorphic phantom and EBT3 film

Background: In head and neck radiotherapy, immobilization devices can affect dose delivery. In this study, a comprehensive end-to-end test was developed to evaluate the accuracy of radiotherapy treatment. Materials and Methods: An Alderson Radiation Therapy (ART) anthropomorphic phantom with EBT3 film was used to mimic the actual patient treatment process. Ten patients treated for nasopharyngea...

متن کامل

Minimizing End – to – End Delay in Multiparty Network Applications

In these days interaction between different network applications are becoming more popular and to improve the speed and datatransfer rate delay difference between the multynetworks should minimize. In this paper we propose a Latency EQualization (LEQ) service, which equalizes the perceived latency for all clients participating in an interactive network application. The few routers used in LEQ c...

متن کامل

Cross Layer Using End-to-end Delay Assessment for Routing Protocol in Vehicular Ad Hoc Network

The moving with fast velocity of each node in vehicular ad hoc network (VANET) results in the existence transient communication links, which degrade the performance of developed protocols. Established routes frequently become invalid, and existing communication flows are interrupted, incurring delay and additional overhead. In this paper we use cross layer approach solving these problems. First...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2019

ISSN: 2319-5940,2278-1021

DOI: 10.17148/ijarcce.2019.8614