5,023 results on '"Enterprise network"'
Search Results
2. Exploiting Physarum-Inspired Vacant Particle Transport Model to Redesign an Enterprise Network
- Author
-
Habib, Sami J., Marimuthu, Paulvanna N., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Rocha, Álvaro, editor, Adeli, Hojjat, editor, Dzemyda, Gintautas, editor, Moreira, Fernando, editor, and Poniszewska-Marańda, Aneta, editor
- Published
- 2024
- Full Text
- View/download PDF
3. A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection
- Author
-
Minzhao Lyu, Hassan Habibi Gharakheili, and Vijay Sivaraman
- Subjects
DDoS ,enterprise network ,host monitoring ,network security ,reconnaissance scan ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Enterprise networks that host valuable assets and services are popular and frequent targets of distributed network attacks. In order to cope with the ever-increasing threats, industrial and research communities develop systems and methods to monitor the behaviors of their assets and protect them from critical attacks. In this survey, we systematically survey related research articles and industrial systems to highlight the current status of this arms race in enterprise network security. First, we discuss the taxonomy of distributed network attacks on enterprise assets, including reconnaissance attacks probing vulnerable enterprise hosts and servers, and distributed denial-of-service (DDoS) attacks aiming to paralyze network services hosted within an enterprise network. Second, we review existing methods that leverage either static configurations or dynamic network graphs to monitor network behavior of enterprise hosts, verify their benign activities and isolate potential anomalies. Third, state-of-the-art detection methods for distributed network attacks sourced from external attackers, such as proprietary rules in commercial firewalls and community signatures in open-source software tools are elaborated with highlights on their merits and bottlenecks. Fourth, as programmable networks and machine learning (ML) techniques are increasingly becoming adopted by the community, their current applications in network security are discussed. Finally, we suggest several research gaps on enterprise network security to inspire future research.
- Published
- 2024
- Full Text
- View/download PDF
4. Gartner: Network automation to increase threefold by 2026
- Subjects
Enterprise network ,Market trend/market analysis ,Technology application ,Automation -- Forecasts and trends ,Enterprise networks -- Technology application -- Forecasts and trends ,Marketing research firms -- Reports ,Mechanization -- Forecasts and trends ,Gartner Inc. -- Reports - Abstract
By 2026, 30% of enterprises will automate more than half of their network activities, according to Gartner. By comparison, less than 10% of enterprises were automating more than half of [...]
- Published
- 2024
5. Starting zero trust without spending a dime
- Subjects
Information technology -- Management ,Enterprise networks -- Safety and security measures ,Data security -- Methods ,Security management -- Methods ,Enterprise network ,Data security issue ,Computers ,High technology industry ,Telecommunications industry - Abstract
Changing infrastructure is generally the first draw for any enterprise zero trust initiative, separating resources on the network that traditionally had carte blanche access to anything it could ping. NIST, [...]
- Published
- 2024
6. Getting your enterprise ready for the real AI
- Subjects
Artificial intelligence -- Usage ,Enterprise networks -- Technology application ,Business enterprises -- Technology application ,Enterprise network ,Artificial intelligence ,Technology application ,Computers ,High technology industry ,Telecommunications industry - Abstract
If you’re a CxO or tech planner, I’d be willing to bet that your attitudes on AI have changed over just the last couple of months. You no longer carefully [...]
- Published
- 2024
7. Your attack surface is showing, Unit 42 warns enterprises
- Subjects
Information technology -- Management ,Enterprise networks -- Forecasts and trends -- Safety and security measures ,Data security -- Forecasts and trends ,Cloud computing -- Forecasts and trends -- Safety and security measures ,Enterprise network ,Data security issue ,Market trend/market analysis ,Computers ,High technology industry ,Telecommunications industry - Abstract
The average organization adds or updates some 300 services every month, creating a significant challenge for security teams charged with protecting enterprise cloud-based resources, notes Unit 42. Companies in the [...]
- Published
- 2024
8. Extracting the explore‐exploit intelligence of Physarum to manage the sustainability of an enterprise network.
- Author
-
Habib, Sami J. and Marimuthu, Paulvanna Nayaki
- Abstract
In this work, we enhance the sustainability of an enterprise network (EN) by complementing it with an expert system that apprehends the explore‐exploit behavioural intelligence of Physarum to survive against the attractive‐adversarial nutritional environment. EN sustainability is dynamic since it depends on how well EN can react to an adversarial environment. We capture a reverse analogy to characterize EN's workload‐environment with Physarum's nutritive‐environment, where the high volume of workloads at the backbone network corresponds to a poor‐nutrient environment. The expert system explores EN to find out how to manage the workloads as Physarum handles its survivability, and exploits the users' workload patterns by grouping the highly communicating users together to redesign the network structure as Physarum's intelligence to exploit energy from rich‐ and poor‐nutrient food sources through redesigned tubular structures. We define two factors, such as nutrient‐intensity and chemo‐attractant to aid the redesign process. EN evolves through a set of redesigned clusters with an objective function to maximize its sustainability for a given set of explored workloads by minimizing the workloads through the backbone. EN evolution terminates when there is no change in the backbone utilization, resembling the organism's stay in a dormant state until it experiences a favourable environment. Our experimental results on an EN with a higher volume of workloads at the backbone producing 14.26 kWh energy consumption demonstrated that the developed expert system reduced the energy consumption to 11.27 kWh, thus enhanced the sustainability from 21% to 61%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Evolution game model and simulation of enterprise R&D cooperative innovation network under network externalities.
- Author
-
Wang, He, Fu, Ke, and Yu, Qian
- Abstract
Multi-agent cooperation, pooling innovative resources, helps to develop key technologies and major projects in enterprises. However, the multi-agent cooperation of enterprises makes the cooperative relationship unstable, and behaviours such as moral hazard, spillover of technology or information are more likely to occur, thereby increasing the risk of enterprises. In this research an enterprise R&D cooperative evolutionary game model is built to investigate the influence of Network externalities on enterprise R&D cooperation in innovation networks. Furthermore, the evolution of innovative network structure of game results is simulated by means of computer technology so that the effects of network externalities on corporation degree, agglomeration and network structure are analyzed. The results show that Network externalities led to a decrease of cooperated partners, a decline in cooperation degree and agglomeration of enterprises, and a shrinking enterprise R&D cooperation tendency. The influence of network externalities shows significant structural differences in the three types of enterprise networks: the degree of enterprise cooperation and agglomeration fluctuates greatly in the scale-free network, but slightly in the small-world network and the random network. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Why enterprises rely on JavaScript, Python, and Java
- Author
-
Ritter, Simon
- Subjects
JavaScript (Programming language) -- Usage ,Enterprise networks -- Methods ,Python (Programming language) -- Usage ,Java (Computer program language) -- Usage ,Enterprise network ,Java ,Computers and office automation industries - Abstract
Byline: Simon Ritter Despite advances in cloud computing, mobile development, and AI, the day-to-day business of enterprises around the world still runs on three programming languages that made their debut [...]
- Published
- 2024
11. Evolutionary Characteristics and Influencing Factors of the Digital Economic Network in the Yangtze River Delta
- Author
-
Leng Shuofeng, Xi Guangliang, and Zhen Feng
- Subjects
digital economy ,enterprise network ,spatial structure ,investment pattern ,enterprise equity related data ,the yangtze river delta region ,Geography (General) ,G1-922 - Abstract
Against the backdrop of digital technology integration and digital transformation, the digital economy has become an important new economic development in China. The digital economy changes and subverts the traditional production and organization modes of industries, breaks regional and spatial barriers, and realizes a highly interconnected network structure. Therefore, it is critical to study the digital economy from a network analysis perspective. In previous studies, the interlocking network model and the headquarters-branch model have been adopted to construct enterprise networks; however, the networks based on these models have some deficiencies in comprehensiveness and authenticity. An enterprise equity network built based on the investment relationships between enterprises can reflect the actual contact network status of the enterprise. Based on the above background, this study analyzed the evolutionary characteristics of the digital economy network in the Yangtze River Delta area through an enterprise equity network and explored its influencing factors and mechanisms. First, we constructed the digital economy networks of the Yangtze River Delta area for 2010, 2015, and 2020 using equity investment data between enterprises and a directed correlation network model. Second, with the indicators of degree centrality, degree centralization, an investment source, and others, the spatial and temporal evolution characteristics of digital economy networks were described from two aspects: network patterns and investment relationships. Furthermore, this study explored the possible factors affecting digital economy networks in the Yangtze River Delta area through a Quadratic Assignment Procedure. This study has three main findings: 1) From 2010 to 2020, various types of digital economy networks in the Yangtze River Delta area showed the characteristics of hierarchical diffusion and node agglomeration. Each industry forms an expansion of the network framework around the core node in the initial stage and then expands to the surrounding areas through secondary nodes. Shanghai and Hangzhou were the most important network nodes in the digital economy. 2) The number of net inflow areas for digital economy investment in the Yangtze River Delta was increasing, whereas the number of net outflow areas was decreasing. Hangzhou was the main net inflow city, while Shanghai and Ningbo were the main net outflow cities. Simultaneously, the source of investment in research units has changed from inside the province to outside, and there are clear interprovincial differences. 3) Cognitive proximity, the difference in the number of digital economy enterprises, the difference in the proportion of secondary industries, the difference in information facilities, and the early network foundation all have significant positive effects on the establishment of digital economy networks. System proximity, the difference in the proportion of tertiary industries, the time difference in the establishment of digital economy enterprises, and the gap in innovation ability restrict the formation and development of digital economy networks. Geographical distance is no longer the main factor influencing the formation of digital economic networks. Based on the above conclusions, this study proposes some suggestions for promoting the development of the digital economy from the perspectives of industrial agglomeration, facility and policy allocation, and path dependence.
- Published
- 2023
- Full Text
- View/download PDF
12. Zero Trust Security Model for Enterprise Networks
- Author
-
Rania M. Habash and mahmood khalel
- Subjects
Zero Trust model ,Zero Trust security ,Enterprise network ,Cybersecurity ,Never trust ,Information technology ,T58.5-58.64 - Abstract
Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients trying to access recourses on private networks regardless of whether they are sitting within or outside the networks. As opposed to perimeter-based architecture, which makes the assumption that all internal network parties are trusted and all external network parties are untrusted. In enterprise network the internal network parties is automatically seen as trusted entities granting them access to network resources. The insider threat actor has been successful in exploiting their access. So that, enterprise networks become more exposed to inside and outside threads. As a result, we need to add the zero-trust principle to the enterprise network to protect it from the inside. In this paper, the ZT model, is assumed inside the militarized zone. There may be a threat to the sensitive data. Any internal company network users cannot manipulation on his computer without permission from the administrator this is done by the group policies that have been implemented in ZT. This model has been shown to be quite effective in protecting the sensitive data against unauthorized access and also the manipulation by the insider user. Following that, an attack originating from inside of the network was launched against the enterprise and zero trust network. In the enterprise network, the network was effectively attacked, and the attack’s validity was also increased to fully penetrate the enterprise. The attack did not succeed in the zero-trust network because the attacker cannot pass the User Account Control (UAC) to gain the NT authority.
- Published
- 2023
- Full Text
- View/download PDF
13. Research on the Influence of Spatial Structure on Carbon Emission Synergy of Urban Agglomeration—Based on the Development Process of Yangtze River Delta Urban Agglomeration in China.
- Author
-
Su, Hang and Yang, Juntao
- Abstract
Carbon emissions, as an indicator of green economic development in urban agglomerations, are closely related to the degree of coordinated development between cities. Additionally, urban agglomerations, as a highly developed form of urban space, are widely regarded as a more efficient, energy-saving, and land-saving urbanization method. This article constructs an urban agglomeration network based on relevant data from listed companies in the Yangtze River Delta urban agglomeration with practical connections between cities and uses social network analysis methods and a fixed effects model to calculate the impact of overall and individual network indicators of urban agglomerations on urban carbon emissions and collaborative emission reduction of urban agglomerations. The regression results indicate that the centrality of individual cities has a significant negative correlation with the intensity of urban carbon emissions, with a coefficient of −0.067. The centrality of core cities has a significant positive impact on the collaborative emission reduction of urban agglomerations, with a coefficient of 0.0138. The impact of network density on the collaborative emission reduction of urban agglomerations shows an inverted U-shaped curve. Based on the analysis results, the paper explores the spatial structure construction method and industrial development control strategy based on urban agglomeration collaborative emission reduction. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. 长三角数字经济网络演化特征及影响因素.
- Author
-
冷硕峰, 席广亮, and 甄峰
- Abstract
Against the backdrop of digital technology integration and digital transformation, the digital economy has become an important new economic development in China. The digital economy changes and subverts the traditional production and organization modes of industries, breaks regional and spatial barriers, and realizes a highly interconnected network structure. Therefore, it is critical to study the digital economy from a network analysis perspective. In previous studies, the interlocking network model and the headquarters-branch model have been adopted to construct enterprise networks; however, the networks based on these models have some deficiencies in comprehensiveness and authenticity. An enterprise equity network built based on the investment relationships between enterprises can reflect the actual contact network status of the enterprise. Based on the above background, this study analyzed the evolutionary characteristics of the digital economy network in the Yangtze River Delta area through an enterprise equity network and explored its influencing factors and mechanisms. First, we constructed the digital economy networks of the Yangtze River Delta area for 2010, 2015, and 2020 using equity investment data between enterprises and a directed correlation network model. Second, with the indicators of degree centrality, degree centralization, an investment source, and others, the spatial and temporal evolution characteristics of digital economy networks were described from two aspects: network patterns and investment relationships. Furthermore, this study explored the possible factors affecting digital economy networks in the Yangtze River Delta area through a Quadratic Assignment Procedure. This study has three main findings: 1) From 2010 to 2020, various types of digital economy networks in the Yangtze River Delta area showed the characteristics of hierarchical diffusion and node agglomeration. Each industry forms an expansion of the network framework around the core node in the initial stage and then expands to the surrounding areas through secondary nodes. Shanghai and Hangzhou were the most important network nodes in the digital economy. 2) The number of net inflow areas for digital economy investment in the Yangtze River Delta was increasing, whereas the number of net outflow areas was decreasing. Hangzhou was the main net inflow city, while Shanghai and Ningbo were the main net outflow cities. Simultaneously, the source of investment in research units has changed from inside the province to outside, and there are clear interprovincial differences. 3) Cognitive proximity, the difference in the number of digital economy enterprises, the difference in the proportion of secondary industries, the difference in information facilities, and the early network foundation all have significant positive effects on the establishment of digital economy networks. System proximity, the difference in the proportion of tertiary industries, the time difference in the establishment of digital economy enterprises, and the gap in innovation ability restrict the formation and development of digital economy networks. Geographical distance is no longer the main factor influencing the formation of digital economic networks. Based on the above conclusions, this study proposes some suggestions for promoting the development of the digital economy from the perspectives of industrial agglomeration, facility and policy allocation, and path dependence. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. What's the Difference Between the Enterprise and Consumer Meta verses?
- Author
-
Shah, Apurva
- Subjects
Enterprise networks -- Usage ,Electronic data processing -- Forecasts and trends ,Virtual worlds -- Innovations -- Forecasts and trends ,Enterprise network ,Market trend/market analysis ,Business ,Computers and office automation industries ,Electronics and electrical industries - Abstract
The enterprise metaverse is a Fortnite but for digital twins. Presented is a perspective for developers on the challenges--and opportunities--ahead. I he 'enterprise metaverse'--the metaverse for commercial, industrial infrastructure, and [...]
- Published
- 2022
16. Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall (NGFW)
- Author
-
Arefin, Md. Taslim, Uddin, Md. Raihan, Evan, Nawshad Ahmad, Alam, Md Raiyan, Xhafa, Fatos, Series Editor, Pandian, A.Pasumpon, editor, Fernando, Xavier, editor, and Islam, Syed Mohammed Shamsul, editor
- Published
- 2021
- Full Text
- View/download PDF
17. Scoring Algorithm Identifying Anomalous Behavior in Enterprise Network
- Author
-
Sharma, Sonam, Makkar, Garima, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Sharma, Neha, editor, Chakrabarti, Amlan, editor, Balas, Valentina Emilia, editor, and Martinovic, Jan, editor
- Published
- 2021
- Full Text
- View/download PDF
18. Enhanced Data Security Architecture in Enterprise Networks
- Author
-
Rashmi Shree, V, Antony, Zachariah C. F., Jayapandian, N., Xhafa, Fatos, Series Editor, Pandian, A. Pasumpon, editor, Senjyu, Tomonobu, editor, Islam, Syed Mohammed Shamsul, editor, and Wang, Haoxiang, editor
- Published
- 2020
- Full Text
- View/download PDF
19. Knowledge Mapping of Enterprise Network Research in China: A Visual Analysis Using CiteSpace.
- Author
-
Wancheng Yang, Shaofeng Wang, Chen Chen, Ho Hon Leung, Qi Zeng, and Xin Su
- Subjects
SOCIAL network theory ,CITATION indexes - Abstract
Enterprise Network (EN) has increasingly gained popularity in academia. Over the past few decades, a substantial amount of EN studies have been published in China. Drawing upon a sample of 603 papers retrieved from the Chinese Social Sciences Citation Index database (CSSCI) between 1998 and 2020, this study aims to delve into the status quo, knowledge base, research focus, and evolutionary trends of EN research in China. A multifaceted bibliometric analysis was performed using CiteSpace. The findings mainly indicate that the research on EN in China has a clear development context, and the research content gradually changes from macro to micro. In addition to foreign Social Network theories, the research results of domestic scholars have become the basic knowledge in this field. The research includes these topics: the conceptualization of EN, EN as indicators of enterprise development, EN's impact on start-ups, mechanisms of EN's effect and governance of EN. The potential direction for future research has been identified as the integration between EN and other forms of networks, and the structure of EN. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. COVID-19 pandemisinin kurumsal ağlarda veri kullanım oranına olan etkisi.
- Author
-
YILMAZ, Aykut and ASLAN, Zafer
- Subjects
- *
TRAFFIC density , *WAVELET transforms , *TRAFFIC speed , *INFRASTRUCTURE (Economics) , *COVID-19 - Abstract
The importance of using and processing data in corporate networks is increasing day by day in the developing global world. Due to the nature of the systems, the use of data increases the network traffic density from the connected roads. The increase in data density is one of the most important factors affecting system infrastructures and performance values. Measuring and evaluating the effect of data usage amounts before the start of COVID-19 on the usage density rates of network traffic in corporate networks and the effect of network traffic density that develops with the onset of the pandemic process provides a better understanding of this structure. By using Wavelet Transform and Continuous Wavelet Transform, the temporal variation of data density was analyzed with an application based on the data set obtained from the system. The graphical data created after the analysis of the signal data (Mbps or Gbps) processed before and after the COVID-19 by using Wavelet Transform were examined and interpreted. a specific results, statistical magnitudes and different scale effects were analized. While there were 8791 data before COVID-19, 16167 data were taken into account after COVID-19. In addition, when the network traffic was examined after the pandemic period, it increased %141 times, higher thans the speed recorded before pandemic period similarly the average network traffic speed is %79 times. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. Researchers Submit Patent Application, "Method and Apparatus for Event Triggered Positioning of Enterprise Premises Equipment in a Wireless Network", for Approval (USPTO 20240224220).
- Abstract
A patent application has been submitted for a method and apparatus that aims to determine the position of Enterprise Premises Equipment (EPE) in a wireless communication system. The invention is particularly focused on assisting emergency personnel in locating EPEs, such as defibrillators, in an enterprise network during an emergency situation. The method involves using various measurements, such as Bluetooth beacons, Wi-Fi access points, LTE or NR pilots, and camera sensors, to track the movement of the EPE and report the information to a Device Location Server (DLS). The patent application provides detailed information on the technical aspects and functionalities of the proposed system. [Extracted from the article]
- Published
- 2024
22. Energy-Aware and Location-Constrained Virtual Network Embedding in Enterprise Network
- Author
-
Cong, Xin, Zi, Lingling, Shuang, Kai, Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Pandu Rangan, C., Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Liu, Xiao, editor, Mrissa, Michael, editor, Zhang, Liang, editor, Benslimane, Djamal, editor, Ghose, Aditya, editor, Wang, Zhongjie, editor, Bucchiarone, Antonio, editor, Zhang, Wei, editor, Zou, Ying, editor, and Yu, Qi, editor
- Published
- 2019
- Full Text
- View/download PDF
23. Mapping an Enterprise Network by Analyzing DNS Traffic
- Author
-
Lyu, Minzhao, Habibi Gharakheili, Hassan, Russell, Craig, Sivaraman, Vijay, Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Pandu Rangan, C., Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Choffnes, David, editor, and Barcellos, Marinho, editor
- Published
- 2019
- Full Text
- View/download PDF
24. Enterprise Blockchain Offers Operational Transparency and Security--GlobalData
- Subjects
Information technology -- Management ,Enterprise networks -- Safety and security measures ,Enterprise network ,Market trend/market analysis ,Business ,Computers and office automation industries ,Computers - Abstract
As the hype around cryptocurrencies subsides, enterprises are increasingly investigating blockchain use cases to infuse into their operations and processes. With adequate implementation and controls in place, enterprise blockchain can [...]
- Published
- 2023
25. Energy Optimized Virtual Network Embedding With Location Constraint in the Enterprise Network
- Author
-
Xin Cong, Kai Shuang, and Lingling Zi
- Subjects
Energy optimization ,location-constrained ,virtual network embedding ,enterprise network ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
To satisfy enterprise demands of analyzing and dealing with the large scale of data with lower costs, an effective method is to integrate the servers and computers and use virtualization technology to construct an enterprise network. Prior studies on network virtualization have mainly been executed in the cloud; however, these studies may not be appropriate for enterprise networks for two reasons: i) the goal of most of them is to generate more revenues for cloud providers, but focus less on saving costs; ii) the physical machines are relatively concentrated in the cloud platform but dispersed over different geographic locations in enterprise networks. In this paper, we solve the problem of energy-optimized virtual network embedding with location constraints (EO-VNE). First, the node and link capabilities in enterprise networks are defined in the form of complex number theory, unifying computers and virtual requests. Second, the normalized method of computing and storage capabilities are proposed to identify the node capability. Third, an energy model of the enterprise network is built, and using this model, EO-VNE is shown to be NP-complete. Finally, an energy-optimized virtual network embedding with a location constraint algorithm (EOLC) is proposed to minimize the energy consumption under the constraint of node position. The experiments show that EOLC consumes less energy compared with the algorithm of energy-aware virtual network embedding with dynamic demands (EAD). It also has better performance than the location constraint algorithm based on bisection (GLC).
- Published
- 2020
- Full Text
- View/download PDF
26. Network based Enterprise Profiling with Semi-Supervised Learning.
- Author
-
Park, Sunghong, Park, Kanghee, and Shin, Hyunjung
- Subjects
- *
SUPERVISED learning , *CREDIT risk , *ORGANIZATIONAL performance , *VALUE (Economics) , *BUSINESS enterprises - Abstract
Enterprise evaluation provides indicators such as ratings and scores by analyzing the characteristics and capabilities of enterprises. The business performance, the level of credit risk, and the economic value of technology are quantitatively evaluated. Although the existing methods are well established, they need improvement in three aspects: fragmentation of information, interpretability of results, and objectivity of evaluation. First, existing methods selectively utilizes the information according to its own purpose. Second, it is hard for those results to understand the rationale of evaluation and the characteristics of enterprise. Third, unofficial information such as personal opinions or profit structures are included in the evaluation. Motivated by the limitations, we propose a machine learning-based enterprise evaluation method consisting of diversified quantification and semi-supervised learning. By quantifying various information, the analysis for identifying enterprise characteristics is primarily performed, and the results are derived as several remarkable features to improve interpretability. Then, by constructing the network, enterprises have compared each other, and they are objectively evaluated by label propagation on the enterprise network. The output is measured as a score, and later its distribution is binned into five grades to improve practicality and usefulness. The proposed method was applied to the dataset of 27,790 enterprises with 113 variables about financial and R&D information. The results show clear identification of enterprise characteristics with the high accuracy of evaluation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Get started on your Zero Trust journey
- Author
-
Kamat, Rishikesh
- Subjects
Data security -- Forecasts and trends ,Enterprise networks -- Forecasts and trends -- Safety and security measures ,Security management -- Forecasts and trends ,Enterprise network ,Data security issue ,Market trend/market analysis ,Computers - Abstract
Byline: Rishikesh Kamat Every enterprise is different and will have its own unique Zero Trust journey. From our own experience, we have outlined some best practices, which we believe will [...]
- Published
- 2022
28. Projects
- Author
-
Kizza, Joseph Migga, Sammes, A.J., Series editor, and Kizza, Joseph Migga
- Published
- 2017
- Full Text
- View/download PDF
29. Integrating Service Delivery for IT and OT Communications
- Author
-
Samitier, Carlos, Cigré, Series editor, and Samitier, Carlos, editor
- Published
- 2017
- Full Text
- View/download PDF
30. Office-to-Field Applications
- Author
-
Samitier, Carlos, Cigré, Series editor, and Samitier, Carlos, editor
- Published
- 2017
- Full Text
- View/download PDF
31. Investigating Microstructure Patterns of Enterprise Network in Perspective of Ego Network
- Author
-
Shi, Xiutao, Wang, Liqiang, Liu, Shijun, Wang, Yafang, Pan, Li, Wu, Lei, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Chen, Lei, editor, Jensen, Christian S., editor, Shahabi, Cyrus, editor, Yang, Xiaochun, editor, and Lian, Xiang, editor
- Published
- 2017
- Full Text
- View/download PDF
32. Attack Graph Obfuscation
- Author
-
Polad, Hadar, Puzis, Rami, Shapira, Bracha, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Dolev, Shlomi, editor, and Lodha, Sachin, editor
- Published
- 2017
- Full Text
- View/download PDF
33. Installation Problems
- Author
-
Krause, Jörg and Krause, Jörg
- Published
- 2017
- Full Text
- View/download PDF
34. Enterprise Architecture Tools Market Growth, Opportunities Business Scenario, Share, Growth Size, Scope, Key Segments and Forecast to 2026
- Subjects
Epidemics -- Economic aspects ,Enterprise networks -- Market size -- Forecasts and trends -- International marketing ,Computer services industry -- Market size -- Industry forecasts -- International marketing ,Computers -- Services ,Enterprise network ,Market trend/market analysis ,Computer services industry ,Business ,Business, international - Abstract
M2 PRESSWIRE-August 25, 2023-: Enterprise Architecture Tools Market Growth, Opportunities Business Scenario, Share, Growth Size, Scope, Key Segments and Forecast to 2026 (C)1994-2023 M2 COMMUNICATIONS RDATE:24082023 Enterprise Architecture Tools Market [...]
- Published
- 2023
35. The story of Indian enterprise software
- Author
-
Rajguru, Sunil
- Subjects
Information technology -- Management ,Enterprise networks -- Forecasts and trends ,Software engineering -- Forecasts and trends ,Software development/engineering ,Enterprise network ,Market trend/market analysis ,Computers - Abstract
Byline: Sunil Rajguru Edited excerpts from an exhaustive video interview... 'Enterprise software probably played on two legs. Within India, a lot of our efforts were to use IP that was [...]
- Published
- 2022
36. Use of consumption apps in the enterprise
- Author
-
Atchison, Lee
- Subjects
Information technology -- Management ,Enterprise networks -- Usage ,Applications software -- Usage ,Enterprise network ,Computers and office automation industries - Abstract
Byline: Lee Atchison I was talking to a colleague the other day, and they made a statement that I found very interesting. In enterprise IT organizations, only transactional applications are [...]
- Published
- 2022
37. Mediating factors influencing the capacities of enterprise network performance
- Author
-
Lin Lu Zhou and James Onuche Ayegba
- Subjects
mediating factors ,capacities ,enterprise network ,performance ,foods and beverages ,Business ,HF5001-6182 - Abstract
Objective: The study examined the mediating factors influencing the capacities and performance of enterprise network using some food and beverages enterprises in Lagos, Nigeria. Research Design & Methods: Primary source of data was employed in the study. The data collected from five hundred and thirty nine (539) respondents was analysed with the use of factor analysis which brings out the beauty and reality of the study. Six hundred and fifty seven (657) middle and top level management staff of six food enterprises and beverage enterprises particularly the manufacturing ones through a purposive sampling technique. Findings: When the original ten variables were analyzed, four variables were extracted from the analysis with eigenvalues greater or equal to 1, which explained 36.414 percent of the entire variance. Hence, the mediating factor influencing the capacities of enterprise network performance is Strategic Decision-Making Capacity (SDMC), Technological Capacity (TC), Efficiency Enterprise Capacity (EEC), and Complexity in Technology or Technological Turbulence (TT). Contribution & Value Added: Finally, factors influencing the capacities of network performance are Strategic Decision Making Capacity (SDMC), Technological Capacity (TC), Efficiency Enterprise Capacity (EEC), and Complexity in Technology or Technological Turbulence (TT). The result of the study is essential because of its significant contribution to the body of knowledge and literature regarding strategic management.
- Published
- 2020
- Full Text
- View/download PDF
38. An overview on enterprise networks and company performance
- Author
-
James Onuche Ayegba and Zhou Lu Lin
- Subjects
Enterprises growth ,enterprise network ,technology innovation ,enterprise efficiency ,enterprise performance ,Business ,HF5001-6182 - Abstract
Objective: This study elucidates the empirical review of enterprise networks on company performance. Research Design & Methods: Enterprise networks are also referred to as corporate network which is among the major pillars of any business. The importance of enterprise networks cannot be far-fetched from or beyond its evolving supports through encapsulation of software applications, databases, for the purpose of achieving fully business goals. Findings: The empirical covers the essence of enterprise networks, reasons for enterprise networking in company performance, formation of enterprise network, the management of enterprise network, and the interplay between enterprise network and company performance. It was concluded in the previous studies that performance of enterprise networks could entail enterprise network survival, profit maximization, sales maximization, return on investment, sales growth and a number of employees. Contribution & Value Added: Hence, it is affirmed in this study that enterprise network performance is a set of financial and nonfinancial indices which offer information on the extent of achieving aim, objectives and better outputs of the enterprise network.
- Published
- 2020
- Full Text
- View/download PDF
39. Extreme Extends Dominant Position in Enterprise Network Fabric with More Than 5,000 Global Customer Deployments Worldwide.
- Abstract
Extreme Networks, a leader in cloud networking, has announced that its network Fabric solutions have been successful in improving operational efficiency, network security, and business transformation for its customers. The solutions have been used by various organizations, including the Dubai World Trade Center, San Diego Community College, Volkswagen Poznan, and the Nevada Department of Transportation. Extreme Fabric offers end-to-end network connectivity, allowing customers to improve security through hyper-segmentation and automate network management tasks. The solutions have been widely adopted across industries and have proven to be effective in enhancing network security and performance. [Extracted from the article]
- Published
- 2024
40. An Intrusion Detection Method for Enterprise Network Based on Backpropagation Neural Network.
- Author
-
Fei Chen, Rui Cheng, Yayun Zhu, Siwei Miao, and Liang Zhou
- Subjects
ENTERPRISE networks (Telecommunications) ,INTRUSION detection systems (Computer security) ,ARTIFICIAL neural networks ,PYTHON programming language ,COMPUTER simulation - Abstract
Network security, as the prerequisite for the normal operation of enterprise network, should not focus on a single point, but all aspects of the network, ranging from physics, network, system, application to management. To ensure enterprise network security and prevent network attacks, it is of great importance to build an intrusion detection system (IDS) capable of protecting the network and computers from malicious attacks based on the Internet or host. In light of the above, this paper puts forward an intrusion detection method for enterprise network based on backpropagation neural network (BPNN), and carries out Python simulation of the proposed method on four problems, namely, normal state, the SYN flood (denial-of-service attack), snoop (unauthorized access from a remote host), and saint (reconnaissance attack). The simulation results show that the BPNN-based method could effectively check the network security environment, and accurately identify and detect intrusions. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
41. FISE: A Forwarding Table Structure for Enterprise Networks.
- Author
-
Yang, Shu, Cui, Laizhong, Deng, Xinhao, Li, Qi, Wu, Yulei, Xu, Mingwei, Wang, Dan, and Wu, Jianping
- Abstract
With increasing demands for more flexible services, the routing policies in enterprise networks become much richer. This has placed a heavy burden to the current router forwarding plane in support of the increasing number of policies, primarily due to the limited capacity in TCAM, which further hinders the development of new network services and applications. The scalable forwarding table structures for enterprise networks have therefore attracted numerous attentions from both academia and industry. To tackle this challenge, in this paper we present the design and implementation of a new forwarding table structure. It separates the functions of TCAM and SRAM, and maximally utilizes the large and flexible SRAM. A set of schemes are progressively designed, to compress storage of forwarding rules, and maintain correctness and achieve line-card speeds of packet forwarding. We further design an incremental update algorithm that allows less access to memory. The proposed scheme is validated and evaluated through a realistic implementation on a commercial router using real datasets. Our proposal can be easily implemented in the existing devices. The evaluation results show that the performance of forwarding tables under the proposed scheme is promising. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
42. A Proposal for the Organisational Measure in Intelligent Systems.
- Author
-
Román, Jesús-Ángel and Pérez-Delgado, María-Luisa
- Subjects
NUMBER systems - Abstract
The collaboration within organisations and among organisations is a fundamental concept in the attainment of the overall objectives pursued by an enterprise network in human companies. Swarm systems are intelligent systems that show collaboration within the system; moreover, some models, such as multiple ant colonies, show the collaboration of several systems to achieve a global goal. The collaboration in this type of system optimises the achievement of the overall objectives as in an enterprise network in human organisations. Being able to measure this collaboration allows establishing a relationship between the improvement in the results of the system and the degree of collaboration, both at the level of specialisation of each element of the system and the systems as a whole. The performance of a swarm system depends on the number of members in many cases, so that if we can establish a measure of specialisation and collaboration, we could tipify and classify these systems in terms of the efficiency and the realiability to perform different tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
43. An algorithm for building an enterprise network topology using widespread data sources
- Author
-
Anton Andreev and Iurii Bogoiavlenskii
- Subjects
enterprise network ,network topology ,algorithm ,network management ,topology discovery ,data inference ,algorithm evaluation ,Telecommunication ,TK5101-6720 - Abstract
A lot of network management tasks depend on the description of the network topology. However, the lack of standard methods of the network elements detection, coupled with the incompleteness and heterogeneity of the available topology data, complicate the network topology discovery process. In these conditions, formal models and methods of topology discovery are required. Contribution of the paper is an algorithm for automated enterprise network topology discovery based on a previously developed graph model and criteria for building graph elements. The proposed algorithm is capable of dealing with incomplete heterogeneous data about network topology as well as with the presence in the network of uncooperative devices. The paper also evaluates the algorithm and provides the testing results.
- Published
- 2017
- Full Text
- View/download PDF
44. DESIGN CONCEPT SELECTION DECISIONS IN NEW PRODUCT DEVELOPMENT: A COMPARATIVE ANALYSIS.
- Author
-
GOSWAMI, Mohit
- Subjects
NEW product development ,COMPARATIVE studies ,CONCEPTS ,BUSINESS size - Abstract
Concept selection in new product development projects are a crucial task that need to be carried out effectively to maximize enterprise's profitability. A risk based design concept selection methodology was evolved by Goswami et al.(2014). In the context of this work, we aim to analyze the implications of this research by: a) Comparing and validating the proposed methodology as devised by relevant existing measure(s) in current research literature and propose various improvement ideas that can either change the selection decisions or further improve them b) Ignoring the interaction among the root nodes, evaluate whether selection decisions pertaining to various module instances is affected; c) Assess whether selection decisions change across with respect to the size of the firm i.e. local vs global OEM. [ABSTRACT FROM AUTHOR]
- Published
- 2019
45. Digital Service Platform for Networked Enterprises Collaboration: A Case Study of the NEMESYS Project
- Author
-
Bellini, Francesco, D’Ascenzo, Fabrizio, Dulskaia, Iana, Savastano, Marco, van der Aalst, Wil, Series editor, Mylopoulos, John, Series editor, Rosemann, Michael, Series editor, Shaw, Michael J., Series editor, Szyperski, Clemens, Series editor, Borangiu, Theodor, editor, Dragoicea, Monica, editor, and Nóvoa, Henriqueta, editor
- Published
- 2016
- Full Text
- View/download PDF
46. Secret Outflow Cause Symptom Analysis Through Scenario Assessment
- Author
-
Lee, DongHwi, Park, Woo-Bin, Kim, Yun-Hee, Choi, Kyong-Ho, Kang, Seung-Ho, Kim, Kuinam J., editor, and Joukov, Nikolai, editor
- Published
- 2016
- Full Text
- View/download PDF
47. Risk of Network Insolvency
- Author
-
Quattrociocchi, Bernardino and Quattrociocchi, Bernardino
- Published
- 2016
- Full Text
- View/download PDF
48. Enterprise Networks
- Author
-
Quattrociocchi, Bernardino and Quattrociocchi, Bernardino
- Published
- 2016
- Full Text
- View/download PDF
49. Classification of Networks
- Author
-
Quattrociocchi, Bernardino and Quattrociocchi, Bernardino
- Published
- 2016
- Full Text
- View/download PDF
50. Managing Enterprise Network Resilience Through the Mimicking of Bio-Organisms
- Author
-
Habib, Sami, Marimuthu, Paulvanna N., Kacprzyk, Janusz, Series editor, Rocha, Álvaro, editor, Correia, Ana Maria, editor, Adeli, Hojjat, editor, Reis, Luis Paulo, editor, and Mendonça Teixeira, Marcelo, editor
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.