Welcome to my acadmic webpage

اعلان

اثنين, 09/03/2018 - 15:58
المزيد
Overview: Security Concepts, Types of attacks, Services; Cryptography: Block ciphers, Public-Key; Authentication: Hash functions, User authentication Protocols; Transport-Level Security; Wireless…
Review of Network Technologies for LANs and WANs. Inter-networking. IP, UDP, and TCP protocols, broadcasting and multi-casting, MPLS, Internet Addressing, Internet Routing Protocols: Gateways,…
Solutions to analysis and synthesis problems that may be formulated as flow problems in capacity constrained (or cost constrained) networks. Tools for network flow theory using graph theoretic…
Improving resilience against failures and targeted attacks is an important aspect of network design. The resilience and cost of networks are two opposing objectives in which a designer should…
Communication networks are prone to failures due to targeted attacks or large-scale disasters. Networks can be improved to withstand challenges using mechanisms such as diversity, which can simply…
Backbone networks are prone to failures due to targeted attacks or large-scale disasters. Network resilience can be improved by adding new links to increase network connectivity and robustness.…

المدونات

لا يوجد محتوى حتى الآن