An Intrusion Prevention System As a Proactive Security Mechanism in Network Infrastructure
Nenad Dulanović, Dane Hinić, Dejan Simić (2008)
The Yugoslav Journal of Operations Research
Similarity:
The search session has expired. Please query the service again.
The search session has expired. Please query the service again.
Nenad Dulanović, Dane Hinić, Dejan Simić (2008)
The Yugoslav Journal of Operations Research
Similarity:
Radomir Prodanović, Dejan Simić (2006)
Computer Science and Information Systems
Similarity:
Sebastian Marius Roşu, George Drăgoi (2011)
Computer Science and Information Systems
Similarity:
Andrea Calvagna (2004)
Computer Science and Information Systems
Similarity:
Tie Qiu, Lin Feng, Feng Xia, Guowei Wu, Yu Zhou (2011)
Computer Science and Information Systems
Similarity:
Alfred Aanu Akinsete (2001)
Kragujevac Journal of Mathematics
Similarity:
Daduna, Hans (1991)
Journal of Applied Mathematics and Stochastic Analysis
Similarity:
Joanna Domańska, Adam Domański, Dariusz Augustyn, Jerzy Klamka (2014)
International Journal of Applied Mathematics and Computer Science
Similarity:
Lim, J.-T., Meerkov, S.M. (1996)
Mathematical Problems in Engineering
Similarity:
Pavel Bocharov, Ciro D'Apice, Evgeny Gavrilov, Alexandre Pechinkin (2004)
RAIRO - Operations Research - Recherche Opérationnelle
Similarity:
We consider a G-network with Poisson flow of positive customers. Each positive customer entering the network is characterized by a set of stochastic parameters: customer route, the length of customer route, customer volume and his service length at each route stage as well. The following node types are considered: (0) an exponential node with servers, infinite buffer and FIFO discipline; (1) an infinite-server node; (2) a single-server node with infinite buffer and LIFO PR discipline; (3) a...
K. L. Arya, E. Stachowski (1972)
Applicationes Mathematicae
Similarity: