An Intrusion Prevention System As a Proactive Security Mechanism in Network Infrastructure
Nenad Dulanović, Dane Hinić, Dejan Simić (2008)
The Yugoslav Journal of Operations Research
Similarity:
Nenad Dulanović, Dane Hinić, Dejan Simić (2008)
The Yugoslav Journal of Operations Research
Similarity:
Radomir Prodanović, Dejan Simić (2006)
Computer Science and Information Systems
Similarity:
Sebastian Marius Roşu, George Drăgoi (2011)
Computer Science and Information Systems
Similarity:
Andrea Calvagna (2004)
Computer Science and Information Systems
Similarity:
Tie Qiu, Lin Feng, Feng Xia, Guowei Wu, Yu Zhou (2011)
Computer Science and Information Systems
Similarity:
Alfred Aanu Akinsete (2001)
Kragujevac Journal of Mathematics
Similarity:
Daduna, Hans (1991)
Journal of Applied Mathematics and Stochastic Analysis
Similarity:
Joanna Domańska, Adam Domański, Dariusz Augustyn, Jerzy Klamka (2014)
International Journal of Applied Mathematics and Computer Science
Similarity:
Lim, J.-T., Meerkov, S.M. (1996)
Mathematical Problems in Engineering
Similarity:
Pavel Bocharov, Ciro D'Apice, Evgeny Gavrilov, Alexandre Pechinkin (2004)
RAIRO - Operations Research - Recherche Opérationnelle
Similarity:
We consider a G-network with Poisson flow of positive customers. Each positive customer entering the network is characterized by a set of stochastic parameters: customer route, the length of customer route, customer volume and his service length at each route stage as well. The following node types are considered: (0) an exponential node with servers, infinite buffer and FIFO discipline; (1) an infinite-server node; (2) a single-server node with infinite buffer and LIFO PR discipline; (3) a...
K. L. Arya, E. Stachowski (1972)
Applicationes Mathematicae
Similarity: