2010 2nd International Conference on Computer Engineering and Technology 2010
DOI: 10.1109/iccet.2010.5485336
|View full text |Cite|
|
Sign up to set email alerts
|

Notice of Retraction: 3Why we need the intrusion detection prevention systems (IDPS) in it company

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…In the context of HPC RMs, this can be achieved by replicating multiple master nodes with similar functionalities, where each master node manages a subset of jobs and computing nodes. This strategy is shown to be useful in decentralized or distributed networks [21]- [23] and certain HPC job scheduling scenarios [24]. The second approach is to introduce intermediate control layers to build a hierarchical system to avoid a single node becoming the bottleneck [25], [26].…”
Section: Design Choicesmentioning
confidence: 99%
“…In the context of HPC RMs, this can be achieved by replicating multiple master nodes with similar functionalities, where each master node manages a subset of jobs and computing nodes. This strategy is shown to be useful in decentralized or distributed networks [21]- [23] and certain HPC job scheduling scenarios [24]. The second approach is to introduce intermediate control layers to build a hierarchical system to avoid a single node becoming the bottleneck [25], [26].…”
Section: Design Choicesmentioning
confidence: 99%
“…Cloud computing enables information services to be presented as advanced and scalable applications by taking advantage of a reliable and scalable infrastructure (Mirzaoğlu, 2011). It can be said that those who have used web applications such as Gmail, Wikipedia, Hotmail, or Twitter have experience in cloud computing (Mirashe & Kalyankar, 2010). Cloud computing offers access to information from anywhere and at any time through the internet (Henkoğlu & Külcü, 2013).…”
Section: Cloud Computingmentioning
confidence: 99%
“…Before discussing the importance of IDPS, it is better to know the role of IPS in a network and how it can react to attacks. [1] is basically an IDS which can detect malicious traffic but at the same time it will be able to block them as it resides in-line on the network [13] and acts as a gateway, so that attacks such as DoS should not be succeeded to reach their targets. IPS systems plays a crucial role in detecting and blocking both intrusions such as malwares and DoS activities.…”
Section: Why Idps Is Needed?mentioning
confidence: 99%