Computer networks monitoring and management methods

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bandwidth Management and Monitoring for Community Networks

This paper describes a custom-built system to replace existing routing solutions within an identified community network. The community network in question shares a VSAT Internet connection to provide Internet access to a number of schools and their surrounding communities. This connection provides a limited resource which needs to be managed in order to ensure equitable use by members of the co...

متن کامل

Comprehensive landslide risk management monitoring

Background and objective: Although the risk management and crisis management issues were discussed during recent years in scientific meetings, but still there is no proper planning to deal with natural disasters. The lack of systematic attitude to landslide phenomenon and also loss of predetermined plans for responsibility of the trusted organizations and lack of coordination between these orga...

متن کامل

Strategic resource management decisions in computer networks

Resource management problems play an important role in technology and economy. In general, resource management tries to use an enterprise’s resources as efficiently as possible to maximize a (potentially financial) benefit. This thesis addresses two specific resource management problems in computer networks. Resource Management during Denial-of-Service Attacks During a denial-of-service (DoS) a...

متن کامل

Resource Management and Allocation in Computer and Communication Networks

................................................................................................................................................. 6 CHAPTER

متن کامل

Effective monitoring of slow suspicious activites on computer networks

Slow and suspicious malicious activities on modern computer networks are increasingly hard to detect. An attacker may take days, weeks or months to complete an attack life cycle. A particular challenge is to monitor for stealthy attempts deliberately designed to stay beneath detection thresholds. This doctoral research presents a theoretical framework for effective monitoring of such activities...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science-based technologies

سال: 2018

ISSN: 2310-5461,2075-0781

DOI: 10.18372/2310-5461.39.13075