Middle East Technical University

Displaying 1-31 of 31 results

  • White Papers // May 2013

    DCaaS: Data Consistency as a Service for Managing Data Uncertainty on the Clouds

    Ensuring data correctness over partitioned distributed database systems is a classical problem. Classical solutions proposed to solve this problem are mainly adopting locking or blocking techniques. These techniques are not suitable for cloud environments as they produce terrible response times; due to the long latency and faultiness of wide area...

    Provided By Middle East Technical University

  • White Papers // May 2013

    Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

    In order to perform the analysis and mitigation efforts related with the information security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For...

    Provided By Middle East Technical University

  • White Papers // Jun 2012

    Untrusting Network Coding

    In networks that perform linear network coding, an intermediate network node may receive a much larger number of linear equations of the source symbols than the number of messages it needs to send. For networks constructed by untrusted nodes, the authors propose a relaxed measure of security: they want to...

    Provided By Middle East Technical University

  • White Papers // Jun 2012

    Utility-Based Time and Power Allocation on an Energy Harvesting Downlink: The Optimal Solution

    In this paper, the authors consider the allocation of power level and time slots in a frame to multiple users, on an energy harvesting broadcast system. They focus on the offline problem where the transmitter is aware of the energy arrival statistics of a frame before the frame starts. The...

    Provided By Middle East Technical University

  • White Papers // Jun 2012

    An Algorithm for Proportional-Fair Downlink Scheduling in the Presence of Energy Harvesting

    This paper considers the allocation of time slots in a frame, as well as power and rate to multiple receivers on an energy harvesting downlink. Energy arrival times that will occur within the frame are known at the beginning of the frame. The goal is to solve an optimization problem...

    Provided By Middle East Technical University

  • White Papers // Dec 2011

    Practical Wireless Network Coding and Decoding Methods for Multiple Unicast Transmissions

    The authors propose a simple yet effective wireless network coding and decoding technique. It utilizes spatial diversity through cooperation between nodes which carry out distributed encoding operations dictated by generator matrices of linear block codes. For this purpose, they make use of greedy codes over the binary field and show...

    Provided By Middle East Technical University

  • White Papers // Aug 2011

    A Survey of Recent Work on Energy Harvesting Networks

    Harvesting ambient energy from the environment has become an attractive possibility for nodes in wireless networks. In addition to being environmentally friendly, energy harvesting networks promise almost perpetual operation which has been a holy grail for autonomous networks such as wireless sensor networks, and more recently M2M. However, achieving these...

    Provided By Middle East Technical University

  • White Papers // Jul 2011

    Governing Information Security in Conjunction With Cobit and ISO 27001

    In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS0 27001 and implementing both COBIT and ISO 27001 together when governing information security in enterprises will be issued. Information Security...

    Provided By Middle East Technical University

  • White Papers // Jun 2011

    Clustered Hierarchical Search Structure for Large-Scale Packet Classification on FPGA

    Most current SRAM-based high-speed Internet Protocol (IP) packet classification implementations use tree traversal and pipelining. However, these approaches result in inefficient memory utilization. Due to the limited amount of on-chip memory of the state-of-the-art Field Programmable Gate Arrays (FPGAs), existing designs cannot support large filter databases arising in backbone routers...

    Provided By Middle East Technical University

  • White Papers // Jun 2011

    Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs

    Network router virtualization has recently gained much interest in the research community, as it allows multiple virtual router instances to run on a common physical router platform. The key metrics in designing network virtual routers are number of supported virtual router instances, total number of prefixes, and ability to quickly...

    Provided By Middle East Technical University

  • White Papers // May 2011

    Optimal Offline Packet Scheduling on an Energy Harvesting Broadcast Link

    The authors consider the minimization of packet transmission duration on an energy harvesting Broadcast Channel (BC). Energy and data arrivals are assumed to occur at arbitrary but known instants. An achievable rate region with structural properties satisfied by the two-user AWGN BC capacity region is assumed. Structural properties of power...

    Provided By Middle East Technical University

  • White Papers // Apr 2011

    Optimal Packet Scheduling on an Energy Harvesting Broadcast Link

    The minimization of transmission completion time for a given number of bits per user in an energy harvesting communication system, where energy harvesting instants are known in an offline manner is considered. An achievable rate region with structural properties satisfied by the 2-user AWGN Broadcast Channel capacity region is assumed....

    Provided By Middle East Technical University

  • White Papers // Mar 2011

    Wireless Network Simplification: The Gaussian N-Relay Diamond Network

    The authors consider the Gaussian N-relay diamond network, where a source wants to communicate to a destination node through a layer of N-relay nodes. They investigate the following question: What fraction of the capacity can they maintain by using only k out of the N available relays? They show that...

    Provided By Middle East Technical University

  • White Papers // Jan 2011

    Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes

    Common occurrence of server overload and the threat of Denial-of-Service (DoS) attacks makes highly desirable to improve the performance and DoS resistance of SSL handshakes. In this paper, the authors tackle these two related problems by proposing reverse SSL, an extension in which the server is relieved from the heavy...

    Provided By Middle East Technical University

  • White Papers // Dec 2010

    User Awareness Measurement Through Social Engineering

    TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information Systems Security makes social engineering attacks to Turkish public agencies within the frame of "Information Security Tests". This paper will make an analysis of the social engineering tests that have been carried out in several Turkish public agencies....

    Provided By Middle East Technical University

  • White Papers // Aug 2010

    On the Carrier Frequency Offset Estimation for Frequency Hopping Burst Mode Mobile Radio

    In this paper, the authors evaluate the Cramer-Rao Bounds (CRB) for the estimation of the Carrier Frequency Offset (CFO) for general QAM modulations with no knowledge of the transmitted sequence (blind operation) in Frequency Hopping (FH) based short burst mode mobile radios. They investigate the blind CFO estimation problem in...

    Provided By Middle East Technical University

  • White Papers // Aug 2010

    Cut-Off Rate Based Outage Probability Analysis of Frequency Hopping Mobile Radio Under Jamming Conditions

    This paper deals with the achievable spectral efficiency and outage analysis of short burst Frequency Hopping (FH) mobile radios under heavy jamming scenarios. With the use of outage probability analysis based on cut-off rate, the maximum spectral efficiency (bits/dimension) and the required number of Radio Frequency Bursts (RFB) (or degrees...

    Provided By Middle East Technical University

  • White Papers // Apr 2010

    Optimal Buffer Partitioning on a Multiuser Wireless Link

    Memory is a limited resource in communication devices. While communication, computation and memory capabilities continuously increase, with the advance of standards and systems such as 3G and broadband wireless MAN, there is also a substantial increase in the demand for bandwidth and memory. For example, a typical WiMax base station...

    Provided By Middle East Technical University

  • White Papers // Aug 2009

    Low-Complexity Iterative Channel Estimation and Tracking for Time-Varying Multi-Antenna Systems

    The iterative channel estimation and tracking problem is considered for time-varying frequency-flat fading Multi-Input Multi-Output (MIMO) systems. In order to jointly estimate and track the time-varying multi-antenna channel, the Pilot Symbol Assisted Modulation (PSAM) technique is generalized to the multi-antenna systems. By distributing the pilot symbols along the transmitted block,...

    Provided By Middle East Technical University

  • White Papers // Aug 2009

    Joint Channel Estimation and Decoding With Low-Complexity Iterative Structures in Time-Varying Fading Channels

    A low-complexity Iterative Channel Estimation (ICE) algorithm is proposed with the promise of improved error performance. The new algorithm operates the LMS filter both in the forward and the backward directions along a block. The feedback from the decoder to the estimator is in the form of soft decisions. The...

    Provided By Middle East Technical University

  • White Papers // Jun 2009

    Pushing the Limits of Address Based Authentication: How to Avoid MAC Address Spoofing in Wireless LANs

    It is well-known that in wireless local area networks, authenticating nodes by their MAC addresses is not secure since it is very easy for an attacker to learn one of the authorized addresses and change his MAC address accordingly. In this paper, in order to prevent MAC address spoofing attacks,...

    Provided By Middle East Technical University

  • White Papers // Jun 2009

    Iterative Frequency Domain Equalization for Single-Carrier Wideband MIMO Channels

    Single Carrier Frequency Domain Equalization (SCFDE) is receiving considerable attention recently due to its comparable complexity and performance with OFDM. In this paper, an iterative SC-FDE with decision feedback in frequency domain is proposed for wideband Multiple-Input Multiple-Output (MIMO) channels and more general multi-path vector channels as a generalization of...

    Provided By Middle East Technical University

  • White Papers // Jun 2009

    Probability of Full-Diversity for Simple Coded and Rotated Multidimensional Constellation Systems

    The case of rotation, in use together with coding in a channel with B fading blocks, is analyzed in terms of diversity properties of the coded systems with multi-dimensional rotated constellations (coded-rotated system) output. First closed-form expression obtained is related to the diversity performance of un-rotated generic coding structures with...

    Provided By Middle East Technical University

  • White Papers // Apr 2009

    A Review on Data Mining and Continuous Optimization Applications in Computational Biology and Medicine

    An emerging research area in computational biology and biotechnology is devoted to mathematical modeling and prediction of gene-expression patterns; it nowadays requests mathematics to deeply understand its foundations. This paper surveys data mining and machine learning methods for an analysis of complex systems in computational biology. It mathematically deepens recent...

    Provided By Middle East Technical University

  • White Papers // Apr 2009

    Quality of Service and Security Control for Cluster-Based Wireless Sensor Networks

    This study investigates security and Quality of Service (QoS) issues in cluster-based Wireless Sensor Networks (WSN). The QoS definition consists of four attributes, which are spatial resolution, coverage, network lifetime and packet collisions. And, the security scope of the study is limited by message integrity and authentication. The paper presents...

    Provided By Middle East Technical University

  • White Papers // Mar 2009

    A Report on Current Advancements in Integration of IEEE 802.16 and IEEE 802.11 Networks

    IEEE 802.11 and IEEE 802.16 are two technologies that can provide high data rates, but they both have restrictions on their coverage area. The fact that 802.11 is only able to cover a limited area while 802.16 provides network access to a much larger area but fails in indoor environments...

    Provided By Middle East Technical University

  • White Papers // Feb 2009

    Subcarrier Allocation in OFDMA With Time Varying Channel and Packet Arrivals

    This paper considers the design of efficient low-complexity algorithms for dynamic allocation of subcarriers to users in a multiuser transmitter using Orthogonal Frequency Division. The effects upon throughput and delay performances of several canonical algorithms of varying the number of users, the number of subcarriers, and the statistical characteristics of...

    Provided By Middle East Technical University

  • White Papers // Jan 2009

    Turbo-Like Codes Over Block-Fading and Time-Varying Narrowband Fading Channels

    The authors' main goal in this paper is to construct codes that can perform close to information-theoretic limits in time-varying channels. For this purpose, a new turbo-like code is first proposed for the block-fading channel which achieves the same error performance of a recently introduced blockwise concatenated code but with...

    Provided By Middle East Technical University

  • White Papers // Jan 2009

    Cognitive Radio Sensor Networks

    The increasing demand for wireless communication introduces efficient spectrum utilization challenge. To address this challenge, cognitive radio has emerged as the key technology, which enables opportunistic access to the spectrum. The main potential advantages introduced by cognitive radio are improving spectrum utilization and increasing communication quality. These appealing features match...

    Provided By Middle East Technical University

  • White Papers // Jan 2009

    Iterative Decision Feedback Equalization and Decoding for Rotated Multidimensional Constellations in Block Fading Channels

    It is known that rotated multidimensional constellations can be used effectively to achieve full-rate and full-diversity transmission in block fading channels. However, the optimal decoding complexity is exponential with the number of fading blocks (or degrees of freedom). In this paper, the authors propose a reduced-complexity iterative receiver structure operating...

    Provided By Middle East Technical University

  • White Papers // Jan 2009

    PADRE: Modulated Backscattering-Based PAssive Data REtrieval in Wireless Sensor Networks

    The most difficult challenge for the design of Wireless Sensor Networks (WSN) is to maintain long network lifetimes since the sensor nodes are severely energy-constrained. Traditional WSN assumes employment of conventional RF transmitters which consume most of the stored power on the sensor node. In this regard, Modulated Backscattering (MB)...

    Provided By Middle East Technical University

  • White Papers // Jun 2012

    Utility-Based Time and Power Allocation on an Energy Harvesting Downlink: The Optimal Solution

    In this paper, the authors consider the allocation of power level and time slots in a frame to multiple users, on an energy harvesting broadcast system. They focus on the offline problem where the transmitter is aware of the energy arrival statistics of a frame before the frame starts. The...

    Provided By Middle East Technical University

  • White Papers // May 2011

    Optimal Offline Packet Scheduling on an Energy Harvesting Broadcast Link

    The authors consider the minimization of packet transmission duration on an energy harvesting Broadcast Channel (BC). Energy and data arrivals are assumed to occur at arbitrary but known instants. An achievable rate region with structural properties satisfied by the two-user AWGN BC capacity region is assumed. Structural properties of power...

    Provided By Middle East Technical University

  • White Papers // Aug 2011

    A Survey of Recent Work on Energy Harvesting Networks

    Harvesting ambient energy from the environment has become an attractive possibility for nodes in wireless networks. In addition to being environmentally friendly, energy harvesting networks promise almost perpetual operation which has been a holy grail for autonomous networks such as wireless sensor networks, and more recently M2M. However, achieving these...

    Provided By Middle East Technical University

  • White Papers // Apr 2011

    Optimal Packet Scheduling on an Energy Harvesting Broadcast Link

    The minimization of transmission completion time for a given number of bits per user in an energy harvesting communication system, where energy harvesting instants are known in an offline manner is considered. An achievable rate region with structural properties satisfied by the 2-user AWGN Broadcast Channel capacity region is assumed....

    Provided By Middle East Technical University

  • White Papers // Jun 2012

    An Algorithm for Proportional-Fair Downlink Scheduling in the Presence of Energy Harvesting

    This paper considers the allocation of time slots in a frame, as well as power and rate to multiple receivers on an energy harvesting downlink. Energy arrival times that will occur within the frame are known at the beginning of the frame. The goal is to solve an optimization problem...

    Provided By Middle East Technical University

  • White Papers // Jan 2011

    Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes

    Common occurrence of server overload and the threat of Denial-of-Service (DoS) attacks makes highly desirable to improve the performance and DoS resistance of SSL handshakes. In this paper, the authors tackle these two related problems by proposing reverse SSL, an extension in which the server is relieved from the heavy...

    Provided By Middle East Technical University

  • White Papers // Dec 2010

    User Awareness Measurement Through Social Engineering

    TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information Systems Security makes social engineering attacks to Turkish public agencies within the frame of "Information Security Tests". This paper will make an analysis of the social engineering tests that have been carried out in several Turkish public agencies....

    Provided By Middle East Technical University

  • White Papers // Jan 2009

    Cognitive Radio Sensor Networks

    The increasing demand for wireless communication introduces efficient spectrum utilization challenge. To address this challenge, cognitive radio has emerged as the key technology, which enables opportunistic access to the spectrum. The main potential advantages introduced by cognitive radio are improving spectrum utilization and increasing communication quality. These appealing features match...

    Provided By Middle East Technical University

  • White Papers // Jan 2009

    PADRE: Modulated Backscattering-Based PAssive Data REtrieval in Wireless Sensor Networks

    The most difficult challenge for the design of Wireless Sensor Networks (WSN) is to maintain long network lifetimes since the sensor nodes are severely energy-constrained. Traditional WSN assumes employment of conventional RF transmitters which consume most of the stored power on the sensor node. In this regard, Modulated Backscattering (MB)...

    Provided By Middle East Technical University

  • White Papers // Mar 2009

    A Report on Current Advancements in Integration of IEEE 802.16 and IEEE 802.11 Networks

    IEEE 802.11 and IEEE 802.16 are two technologies that can provide high data rates, but they both have restrictions on their coverage area. The fact that 802.11 is only able to cover a limited area while 802.16 provides network access to a much larger area but fails in indoor environments...

    Provided By Middle East Technical University

  • White Papers // Jun 2009

    Probability of Full-Diversity for Simple Coded and Rotated Multidimensional Constellation Systems

    The case of rotation, in use together with coding in a channel with B fading blocks, is analyzed in terms of diversity properties of the coded systems with multi-dimensional rotated constellations (coded-rotated system) output. First closed-form expression obtained is related to the diversity performance of un-rotated generic coding structures with...

    Provided By Middle East Technical University

  • White Papers // Jan 2009

    Turbo-Like Codes Over Block-Fading and Time-Varying Narrowband Fading Channels

    The authors' main goal in this paper is to construct codes that can perform close to information-theoretic limits in time-varying channels. For this purpose, a new turbo-like code is first proposed for the block-fading channel which achieves the same error performance of a recently introduced blockwise concatenated code but with...

    Provided By Middle East Technical University

  • White Papers // Jan 2009

    Iterative Decision Feedback Equalization and Decoding for Rotated Multidimensional Constellations in Block Fading Channels

    It is known that rotated multidimensional constellations can be used effectively to achieve full-rate and full-diversity transmission in block fading channels. However, the optimal decoding complexity is exponential with the number of fading blocks (or degrees of freedom). In this paper, the authors propose a reduced-complexity iterative receiver structure operating...

    Provided By Middle East Technical University

  • White Papers // Feb 2009

    Subcarrier Allocation in OFDMA With Time Varying Channel and Packet Arrivals

    This paper considers the design of efficient low-complexity algorithms for dynamic allocation of subcarriers to users in a multiuser transmitter using Orthogonal Frequency Division. The effects upon throughput and delay performances of several canonical algorithms of varying the number of users, the number of subcarriers, and the statistical characteristics of...

    Provided By Middle East Technical University

  • White Papers // Aug 2010

    On the Carrier Frequency Offset Estimation for Frequency Hopping Burst Mode Mobile Radio

    In this paper, the authors evaluate the Cramer-Rao Bounds (CRB) for the estimation of the Carrier Frequency Offset (CFO) for general QAM modulations with no knowledge of the transmitted sequence (blind operation) in Frequency Hopping (FH) based short burst mode mobile radios. They investigate the blind CFO estimation problem in...

    Provided By Middle East Technical University

  • White Papers // Aug 2010

    Cut-Off Rate Based Outage Probability Analysis of Frequency Hopping Mobile Radio Under Jamming Conditions

    This paper deals with the achievable spectral efficiency and outage analysis of short burst Frequency Hopping (FH) mobile radios under heavy jamming scenarios. With the use of outage probability analysis based on cut-off rate, the maximum spectral efficiency (bits/dimension) and the required number of Radio Frequency Bursts (RFB) (or degrees...

    Provided By Middle East Technical University

  • White Papers // Aug 2009

    Low-Complexity Iterative Channel Estimation and Tracking for Time-Varying Multi-Antenna Systems

    The iterative channel estimation and tracking problem is considered for time-varying frequency-flat fading Multi-Input Multi-Output (MIMO) systems. In order to jointly estimate and track the time-varying multi-antenna channel, the Pilot Symbol Assisted Modulation (PSAM) technique is generalized to the multi-antenna systems. By distributing the pilot symbols along the transmitted block,...

    Provided By Middle East Technical University

  • White Papers // Jun 2009

    Iterative Frequency Domain Equalization for Single-Carrier Wideband MIMO Channels

    Single Carrier Frequency Domain Equalization (SCFDE) is receiving considerable attention recently due to its comparable complexity and performance with OFDM. In this paper, an iterative SC-FDE with decision feedback in frequency domain is proposed for wideband Multiple-Input Multiple-Output (MIMO) channels and more general multi-path vector channels as a generalization of...

    Provided By Middle East Technical University

  • White Papers // Aug 2009

    Joint Channel Estimation and Decoding With Low-Complexity Iterative Structures in Time-Varying Fading Channels

    A low-complexity Iterative Channel Estimation (ICE) algorithm is proposed with the promise of improved error performance. The new algorithm operates the LMS filter both in the forward and the backward directions along a block. The feedback from the decoder to the estimator is in the form of soft decisions. The...

    Provided By Middle East Technical University

  • White Papers // Apr 2010

    Optimal Buffer Partitioning on a Multiuser Wireless Link

    Memory is a limited resource in communication devices. While communication, computation and memory capabilities continuously increase, with the advance of standards and systems such as 3G and broadband wireless MAN, there is also a substantial increase in the demand for bandwidth and memory. For example, a typical WiMax base station...

    Provided By Middle East Technical University

  • White Papers // Jul 2011

    Governing Information Security in Conjunction With Cobit and ISO 27001

    In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS0 27001 and implementing both COBIT and ISO 27001 together when governing information security in enterprises will be issued. Information Security...

    Provided By Middle East Technical University

  • White Papers // Dec 2011

    Practical Wireless Network Coding and Decoding Methods for Multiple Unicast Transmissions

    The authors propose a simple yet effective wireless network coding and decoding technique. It utilizes spatial diversity through cooperation between nodes which carry out distributed encoding operations dictated by generator matrices of linear block codes. For this purpose, they make use of greedy codes over the binary field and show...

    Provided By Middle East Technical University

  • White Papers // Jun 2012

    Untrusting Network Coding

    In networks that perform linear network coding, an intermediate network node may receive a much larger number of linear equations of the source symbols than the number of messages it needs to send. For networks constructed by untrusted nodes, the authors propose a relaxed measure of security: they want to...

    Provided By Middle East Technical University

  • White Papers // May 2013

    DCaaS: Data Consistency as a Service for Managing Data Uncertainty on the Clouds

    Ensuring data correctness over partitioned distributed database systems is a classical problem. Classical solutions proposed to solve this problem are mainly adopting locking or blocking techniques. These techniques are not suitable for cloud environments as they produce terrible response times; due to the long latency and faultiness of wide area...

    Provided By Middle East Technical University

  • White Papers // Apr 2009

    A Review on Data Mining and Continuous Optimization Applications in Computational Biology and Medicine

    An emerging research area in computational biology and biotechnology is devoted to mathematical modeling and prediction of gene-expression patterns; it nowadays requests mathematics to deeply understand its foundations. This paper surveys data mining and machine learning methods for an analysis of complex systems in computational biology. It mathematically deepens recent...

    Provided By Middle East Technical University

  • White Papers // Apr 2009

    Quality of Service and Security Control for Cluster-Based Wireless Sensor Networks

    This study investigates security and Quality of Service (QoS) issues in cluster-based Wireless Sensor Networks (WSN). The QoS definition consists of four attributes, which are spatial resolution, coverage, network lifetime and packet collisions. And, the security scope of the study is limited by message integrity and authentication. The paper presents...

    Provided By Middle East Technical University

  • White Papers // Jun 2009

    Pushing the Limits of Address Based Authentication: How to Avoid MAC Address Spoofing in Wireless LANs

    It is well-known that in wireless local area networks, authenticating nodes by their MAC addresses is not secure since it is very easy for an attacker to learn one of the authorized addresses and change his MAC address accordingly. In this paper, in order to prevent MAC address spoofing attacks,...

    Provided By Middle East Technical University

  • White Papers // Mar 2011

    Wireless Network Simplification: The Gaussian N-Relay Diamond Network

    The authors consider the Gaussian N-relay diamond network, where a source wants to communicate to a destination node through a layer of N-relay nodes. They investigate the following question: What fraction of the capacity can they maintain by using only k out of the N available relays? They show that...

    Provided By Middle East Technical University

  • White Papers // Jun 2011

    Clustered Hierarchical Search Structure for Large-Scale Packet Classification on FPGA

    Most current SRAM-based high-speed Internet Protocol (IP) packet classification implementations use tree traversal and pipelining. However, these approaches result in inefficient memory utilization. Due to the limited amount of on-chip memory of the state-of-the-art Field Programmable Gate Arrays (FPGAs), existing designs cannot support large filter databases arising in backbone routers...

    Provided By Middle East Technical University

  • White Papers // Jun 2011

    Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs

    Network router virtualization has recently gained much interest in the research community, as it allows multiple virtual router instances to run on a common physical router platform. The key metrics in designing network virtual routers are number of supported virtual router instances, total number of prefixes, and ability to quickly...

    Provided By Middle East Technical University

  • White Papers // May 2013

    Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities

    In order to perform the analysis and mitigation efforts related with the information security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For...

    Provided By Middle East Technical University