Journal articles on the topic 'All-Optical Network Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'All-Optical Network Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhao, Zhong-Nan, Pei-Li Qiao, Jian Wang, and Guan-Yu Hu. "Security Situation Assessment of All-Optical Network Based on Evidential Reasoning Rule." Mathematical Problems in Engineering 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/9312476.
Full textPalak, Kesar, and Kaur Sandhu Mandeep. "Security Issues and the Energy Consumption in the Optical Burst Switched Networks." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 881–85. https://doi.org/10.31142/ijtsrd23934.
Full textFeng, Manying, Yiyuan Xie, Li Dai, et al. "Security mesh-based optical network exploiting the double masking scheme." Optics Express 30, no. 24 (2022): 43826. http://dx.doi.org/10.1364/oe.471213.
Full textZhang, Yi. "Exploration On the Construction of Smart Campus All-Optical Network." Journal of Big Data and Computing 2, no. 2 (2024): 106–11. http://dx.doi.org/10.62517/jbdc.202401214.
Full textFok, Mable P., and Paul R. Prucnal. "All-optical encryption based on interleaved waveband switching modulation for optical network security." Optics Letters 34, no. 9 (2009): 1315. http://dx.doi.org/10.1364/ol.34.001315.
Full textChen, Lanlan. "Secure Data Sequence Recognition of All-Optical High-Speed Network Using Semiconductor Optical Amplifier." Journal of Nanoelectronics and Optoelectronics 16, no. 10 (2021): 1667–74. http://dx.doi.org/10.1166/jno.2021.3124.
Full textMao, Zhi Jie, Jiang Tao Wei, Hong Wei Li, Qiong Wu, and Feng Chen Qian. "Physical Layer Security Solutions for High Speed Data Networks." Advanced Materials Research 712-715 (June 2013): 2514–20. http://dx.doi.org/10.4028/www.scientific.net/amr.712-715.2514.
Full textSpurny, Vladimir, Petr Munster, Adrian Tomasov, Tomas Horvath, and Edvin Skaljo. "Physical Layer Components Security Risks in Optical Fiber Infrastructures." Sensors 22, no. 2 (2022): 588. http://dx.doi.org/10.3390/s22020588.
Full textFahmida, Rahman, and Arozullah Mohammed. "REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PHYSICAL LEVEL." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 01–21. https://doi.org/10.5281/zenodo.4400051.
Full textTang, Ying, Ziyi Kang, Xin Li, Ningjing Liang, Jinyong Chang, and Genqing Bian. "Tunable All-Optical Pattern Recognition System Based on Nonlinear Optical Loop Mirror for Bit-Flip BPSK Targets." Photonics 12, no. 4 (2025): 342. https://doi.org/10.3390/photonics12040342.
Full textZhang, Qian, Sujay Charania, Stefan Rothe, et al. "Multimode Optical Interconnects on Silicon Interposer Enable Confidential Hardware-to-Hardware Communication." Sensors 23, no. 13 (2023): 6076. http://dx.doi.org/10.3390/s23136076.
Full textSavva, Giannis, Konstantinos Manousakis, and Georgios Ellinas. "Network coding-based routing and spectrum allocation in elastic optical networks for enhanced physical layer security." Photonic Network Communications 40 (August 6, 2020): 160–74. https://doi.org/10.1007/s11107-020-00893-w.
Full textClupek, Vlastimil, Tomas Horvath, Petr Munster, and Vaclav Oujezsky. "New Security Improvements in Next-Generation Passive Optical Networks Stage 2." Applied Sciences 9, no. 20 (2019): 4430. http://dx.doi.org/10.3390/app9204430.
Full textAslam, Muhammad Muzamil, Liping Du, Xiaoyan Zhang, Yueyun Chen, Zahoor Ahmed, and Bushra Qureshi. "Sixth Generation (6G) Cognitive Radio Network (CRN) Application, Requirements, Security Issues, and Key Challenges." Wireless Communications and Mobile Computing 2021 (October 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/1331428.
Full textXu, Fang, and Mingda Dong. "Unmanned-Aerial-Vehicle-Assisted Secure Free Space Optical Transmission in Internet of Things: Intelligent Strategy for Optimal Fairness." Sensors 24, no. 24 (2024): 8070. https://doi.org/10.3390/s24248070.
Full textZhang, Min, Yue Cui, Yueying Zhan, Danshi Wang, and Xue Chen. "All-Optical Parallel Encryption of QPSK Signals Based on Non-Degenerate Four Wave Mixing in HNLF for Physical Layer Security of Optical Network." Procedia Engineering 140 (2016): 8–11. http://dx.doi.org/10.1016/j.proeng.2015.09.236.
Full textSu, Xuan, and Han Gao. "Intelligent fault diagnosis and security early warning method of new power system based on system network situation." Journal of Computational Methods in Sciences and Engineering 24, no. 2 (2024): 891–905. http://dx.doi.org/10.3233/jcm-247293.
Full textPapapavlou, Charalampos, Konstantinos Paximadis, Dimitrios Uzunidis, and Ioannis Tomkos. "Toward SDM-Based Submarine Optical Networks: A Review of Their Evolution and Upcoming Trends." Telecom 3, no. 2 (2022): 234–80. http://dx.doi.org/10.3390/telecom3020015.
Full textNakazawa, Masataka. "Proposal of multifunctional coherent Nyquist pulse and ultra-high-speed and high-efficiency optical transmission technology." Impact 2020, no. 2 (2020): 18–20. http://dx.doi.org/10.21820/23987073.2020.2.18.
Full textDovgiy, Stanislav O., Oleh V. Kopiika, and Oleksii S. Kozlov. "Synthesis of information and telecommunication networks of automatized environmental security systems with the purpose of gaining maximum noise resistance with a given efficiency." Environmental safety and natural resources 40, no. 4 (2021): 5–20. http://dx.doi.org/10.32347/2411-4049.2021.4.5-20.
Full textSkladova, L., R. Murnieks, I. Kurbatska, A. Ostrovskis, V. Bobrovs, and S. Spolitis. "Extending Transceiver Capacity with a Scalable Spectrum Slicing Technique for Optical Access Networks." Latvian Journal of Physics and Technical Sciences 61, no. 3 (2024): 43–52. http://dx.doi.org/10.2478/lpts-2024-0019.
Full textLipps, Christoph, Annika Tjabben, Matthias Rüb, et al. "Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 267–75. http://dx.doi.org/10.34190/eccws.22.1.1207.
Full textWen, Heping, Zhen Liu, Haowen Lai, et al. "Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key." Mathematics 10, no. 17 (2022): 3180. http://dx.doi.org/10.3390/math10173180.
Full textC. A. D, Pahalson, and Nanchen Nimyel Caleb. "5G Wireless Communications for Future Internet of Things: The Need for Free-Space Optical/Visible Light Communication Technology." International Journal of Computer Science and Mobile Computing 8, no. 12 (2019): 124–32. http://dx.doi.org/10.47760/ijcsmc.2019.v08i12.001.
Full textCaserta, Marco, Silvia Schwarze, and Stefan Voß. "Developing a Ring-Based Optical Network Structure with Glass-Through Nodes." Journal of Telecommunications and Information Technology, no. 2 (June 30, 2012): 13–20. http://dx.doi.org/10.26636/jtit.2012.2.1260.
Full textZan, Yinkai, Pingping Lu, and Tingyu Meng. "A Gradual Adversarial Training Method for Semantic Segmentation." Remote Sensing 16, no. 22 (2024): 4277. http://dx.doi.org/10.3390/rs16224277.
Full textNuha, Hilal H., Satria Akbar Mugitama, Ahmed Abo Absa, and Sutiyo. "K-Nearest Neighbors with Third-Order Distance for Flooding Attack Classification in Optical Burst Switching Networks." IoT 6, no. 1 (2024): 1. https://doi.org/10.3390/iot6010001.
Full textUllah, Muhammad Asad, Jason William Setiawan, Junaid ur Rehman, and Hyundong Shin. "On the Robustness of Quantum Algorithms for Blockchain Consensus." Sensors 22, no. 7 (2022): 2716. http://dx.doi.org/10.3390/s22072716.
Full textWang, Chunzhi, Zaoning Wang, Xing Li, Sha Guan, and Ruoxi Wang. "Serial Combination Optimization Method of Packet Transport Network." Wireless Communications and Mobile Computing 2021 (October 18, 2021): 1–10. http://dx.doi.org/10.1155/2021/5495425.
Full textT., Priyanka. "Wireless Communication – A Study." Journal of Optoelectronics and Communication 5, no. 3 (2023): 40–46. https://doi.org/10.5281/zenodo.10258867.
Full textLazzez, Amor. "All-Optical Networks: Security Issues Analysis." Journal of Optical Communications and Networking 7, no. 3 (2015): 136. http://dx.doi.org/10.1364/jocn.7.000136.
Full textMedard, M., D. Marquis, R. A. Barry, and S. G. Finn. "Security issues in all-optical networks." IEEE Network 11, no. 3 (1997): 42–48. http://dx.doi.org/10.1109/65.587049.
Full textMustafa, H. Ali, M. ALkargole Hazim, and A. Hassan Tariq. "A Review of immigration obstacles to PON-FTTH and its evolution around the world." TELKOMNIKA Telecommunication, Computing, Electronics and Control 19, no. 2 (2021): pp. 645~663. https://doi.org/10.12928/TELKOMNIKA.v19i2.16444.
Full textViola, Roberto, Nicola Liberatore, Domenico Luciani, and Sandro Mengali. "Quartz Enhanced Photoacoustic Spectroscopy for Detection of Improvised Explosive Devices and Precursors." Advances in Optical Technologies 2016 (February 1, 2016): 1–12. http://dx.doi.org/10.1155/2016/5757361.
Full textLi, Jian, Xuhui Tang, Jian Lu, et al. "TDMSANet: A Tri-Dimensional Multi-Head Self-Attention Network for Improved Crop Classification from Multitemporal Fine-Resolution Remotely Sensed Images." Remote Sensing 16, no. 24 (2024): 4755. https://doi.org/10.3390/rs16244755.
Full textVijayakumar, Elakiya, Aruna Puviarasan, Puviarasan Natarajan, and Suresh Kumar Ramu Ganesan. "Optical Flow-Based Feature Selection with Mosaicking and FrIFrO Inception V3 Algorithm for Video Violence Detection." Engineering, Technology & Applied Science Research 14, no. 3 (2024): 14475–82. http://dx.doi.org/10.48084/etasr.7270.
Full textGao, Yuzhou, and Guoquan Ma. "Human Motion Recognition Based on Multimodal Characteristics of Learning Quality in Football Scene." Mathematical Problems in Engineering 2021 (August 30, 2021): 1–8. http://dx.doi.org/10.1155/2021/7963616.
Full textSiddiky, Md Nurul Absar, Muhammad Enayetur Rahman, Md Shahriar Uzzal, and H. M. Dipu Kabir. "A Comprehensive Exploration of 6G Wireless Communication Technologies." Computers 14, no. 1 (2025): 15. https://doi.org/10.3390/computers14010015.
Full textZhang, Minghui, Yuhao Sun, Shan Zhao, Jiale Kang, and Weiqi Liu. "Plug-and-play measurement-device-independent quantum digital signature." Laser Physics Letters 22, no. 3 (2025): 035204. https://doi.org/10.1088/1612-202x/adb4c6.
Full textRahman, Fahmida, and Mohammed Arozullah. "Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level." International Journal of Network Security & Its Applications 5, no. 4 (2013): 01–21. http://dx.doi.org/10.5121/ijnsa.2013.5401.
Full textZhao, Hongwei, Zhongxin Chen, Hao Jiang, Wenlong Jing, Liang Sun, and Min Feng. "Evaluation of Three Deep Learning Models for Early Crop Classification Using Sentinel-1A Imagery Time Series—A Case Study in Zhanjiang, China." Remote Sensing 11, no. 22 (2019): 2673. http://dx.doi.org/10.3390/rs11222673.
Full textBelokrynitskiy, Serhii, Kostiantyn Darchuk, and Anton Melnyk. "Analysis of the geodetic support of the territory of the Dnistrovsky district of the Chernivtsi region." Scientific Herald of Chernivtsi University. Geography, no. 845 (December 27, 2023): 161–68. http://dx.doi.org/10.31861/geo.2023.845.161-168.
Full textKalake, Lesole, Wanggen Wan, and Yanqiu Dong. "Applying Ternion Stream DCNN for Real-Time Vehicle Re-Identification and Tracking across Multiple Non-Overlapping Cameras." Sensors 22, no. 23 (2022): 9274. http://dx.doi.org/10.3390/s22239274.
Full textRejeb, Ridha, and Mark S. Leeson. "Control Mechanism for All-Optical Components." Journal of Telecommunications and Information Technology, no. 1 (June 26, 2023): 57–62. http://dx.doi.org/10.26636/jtit.2009.1.915.
Full textNovikova, Irina, and Kunchao Xie. "National Strategic Planning for the Digital Economy: a Competitive Analysis on material of China and Russia." Strategizing: Theory and Practice 3, no. 3 (2023): 298–307. http://dx.doi.org/10.21603/2782-2435-2023-3-3-298-307.
Full textHorvath, Tomas, Petr Munster, and Miloslav Filka. "A Novel Unique Parameter for Increasing of Security in GPON Networks." Journal of Communications Software and Systems 12, no. 2 (2016): 112. http://dx.doi.org/10.24138/jcomss.v12i2.82.
Full textSundeepkumar Singh. "Integrating AI-Based Anomaly Detection with MPK-Isolated Microservices for Proactive Security in Optical Networks." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1693–704. https://doi.org/10.32628/cseit25112537.
Full textMédard, Muriel, Stephen R. Chinn, and Poompat Saengudomlert. "Node wrappers for QoS monitoring in transparent optical nodes." Journal of High Speed Networks 10, no. 4 (2001): 247–68. https://doi.org/10.3233/hsn-2001-205.
Full textYugay, V. V., A. D. Mekhtiyev, P. Sh Madi, A. D. Alkina, and E. G. Neshina. "The use of optical fiber for the creation of security systems for electrical cables of distribution networks of 0.4 kV." Journal of Physics: Conference Series 2140, no. 1 (2021): 012002. http://dx.doi.org/10.1088/1742-6596/2140/1/012002.
Full textSwarup Kumar, J. N. V. R., and D. Suresh. "Automated Secured Data Delivery for Next Generation Optical Networks." Asian Journal of Computer Science and Technology 7, S1 (2018): 104–7. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1794.
Full text