Academic literature on the topic 'Network Device Compliance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network Device Compliance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network Device Compliance"

1

Mohit, Bajpai. "Managing Network Devices Configuration, Golden Configuration, and Network Device Compliance." European Journal of Advances in Engineering and Technology 7, no. 1 (2020): 61–64. https://doi.org/10.5281/zenodo.13762549.

Full text
Abstract:
This paper explores the critical aspects of managing network device configurations, emphasizing the importance of the Golden Configuration concept and network device compliance. As organizations increasingly rely on complex networks to support their operations, effective configuration management is essential for maintaining security, performance, and reliability. The Golden Configuration serves as a standardized, optimal configuration template that aligns with organizational policies and industry best practices. Network device compliance ensures adherence to these standards, thereby reducing r
APA, Harvard, Vancouver, ISO, and other styles
2

Mohit, Bajpai. "Automating Network Device Configuration and Compliance Enforcement." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 7, no. 3 (2019): 1–6. https://doi.org/10.5281/zenodo.14209408.

Full text
Abstract:
Network infrastructures in large organizations are often complex, consisting of a vast array of devices from multiple vendors. Ensuring consistent configuration and compliance across this heterogeneous environment is a significant challenge. This paper explores the use of automation to streamline network device configuration management and enforce compliance with organizational policies. It outlines an architectural approach that leverages a domain-level data model to abstract network design from device-specific configurations, enabling centralized management and automated deployment. The pape
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Davies, Furey Eoghan, and Curran Kevin. "Improving compliance with bluetooth device detection." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 5 (2019): 2355–69. https://doi.org/10.12928/TELKOMNIKA.v17i5.12929.

Full text
Abstract:
The number of devices containing Bluetooth chipsets is continuing to rise and there exists a need to stem the tidal wave of vulnerabilities brought by the Bring Your Own Device (BYOD) and Internet of Things (IoT) phenomena. With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth devices, or creating an accurate Bluetooth device hardware log is limited. The software tools and hardware devices to monitor WiFi networking signals have long been a part of the security auditor’s arsenal, but similar tools for Bluetooth are bespoke, expensive, and not adopted by most securi
APA, Harvard, Vancouver, ISO, and other styles
4

McDaid, Alexander, Eoghan Furey, and Kevin Curran. "Wireless Interference Analysis for Home IoT Security Vulnerability Detection." International Journal of Wireless Networks and Broadband Technologies 10, no. 2 (2021): 55–77. http://dx.doi.org/10.4018/ijwnbt.2021070104.

Full text
Abstract:
The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of things (IoT) and its pervasive nature in the modern home environment, it has caused a spike in security concerns over how the network infrastructure handles, transmits, and stores data. New wireless attacks such as KeySniffer and other attacks of this type cannot be tracked by traditional solutions. Therefore, this study investigates if wireless spectrum frequency monitoring using interference analysis tools can aid in the
APA, Harvard, Vancouver, ISO, and other styles
5

Suresh Reddy Thati. "Configuration and compliance automation in modern networks: A framework for enhanced security and operational efficiency." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2513–19. https://doi.org/10.30574/wjaets.2025.15.2.0613.

Full text
Abstract:
Configuration and compliance automation represents a transformative approach to modern network management, addressing the escalating complexity of enterprise network environments. As organizations expand their digital footprint through cloud integration, IoT adoption, and hybrid work models, the traditional manual approach to network configuration has become increasingly unsustainable. The heterogeneous nature of contemporary networks, typically encompassing multiple vendors, platforms, and technologies, creates significant challenges for maintaining configuration consistency, ensuring regulat
APA, Harvard, Vancouver, ISO, and other styles
6

Leonardi, Luca, Lucia Lo Bello, Gaetano Patti, Alessio Pirri, and Mattia Pirri. "Combined Use of LoRaWAN Medium Access Control Protocols for IoT Applications." Applied Sciences 13, no. 4 (2023): 2341. http://dx.doi.org/10.3390/app13042341.

Full text
Abstract:
The low power wide area networks (LPWANs) based on the LoRaWAN standard are suitable for Internet of Things (IoT) applications that involve a large number of low-power devices distributed over large areas. The LoRaWAN standard imposes some limitations on end-device configuration, such as the medium access strategies to be adopted, which depend on the region in which the network operates. In particular, in Europe, according to the ETSI regulations, a LoRaWAN end-device can use either a pure ALOHA medium access control (MAC) protocol or a polite medium access technique based on Listen Before Tal
APA, Harvard, Vancouver, ISO, and other styles
7

Akilnath, Bodipudi. "Security Framework for 5G-Connected Biomedical Devices in Healthcare." Journal of Scientific and Engineering Research 10, no. 5 (2023): 394–400. https://doi.org/10.5281/zenodo.13348195.

Full text
Abstract:
The advent of 5G technology promises significant advancements in healthcare, particularly through the enhanced connectivity and data transmission capabilities for biomedical devices. However, this increased connectivity also introduces new security challenges that must be addressed to ensure the integrity, confidentiality, and availability of patient data and device functionality. This paper proposes a comprehensive security framework specifically designed for 5G-connected biomedical devices in healthcare environments. The framework encompasses device-level security, network infrastructure res
APA, Harvard, Vancouver, ISO, and other styles
8

Boeding, Matthew, Michael Hempel, and Hamid Sharif. "End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT." Future Internet 17, no. 1 (2025): 34. https://doi.org/10.3390/fi17010034.

Full text
Abstract:
The convergence of IT and OT networks has gained significant attention in recent years, facilitated by the increase in distributed computing capabilities, the widespread deployment of Internet of Things devices, and the adoption of Industrial Internet of Things. This convergence has led to a drastic increase in external access capabilities to previously air-gapped industrial systems for process control and monitoring. To meet the need for remote access to system information, protocols designed for the OT space were extended to allow IT networked communications. However, OT protocols often lack
APA, Harvard, Vancouver, ISO, and other styles
9

Brivio, Stefano, and Sabina Spiga. "Stochastic circuit breaker network model for bipolar resistance switching memories." Journal of Computational Electronics 16, no. 4 (2017): pp 1154–1166. https://doi.org/10.1007/s10825-017-1055-y.

Full text
Abstract:
Abstract:We present a stochastic model for resistance switching devices in which a square grid of resistor breakers plays the role of the insulator switching layer. The probability of breaker switching between two fixed resistance values, ROFF and RON, is determined by the corresponding voltage drop and thermal Joule heating. The breaker switching produces the overall device resistance change. Salient features of all the switching operations of bipolar resistance switching memories (RRAMs) are reproduced by the model and compared to a prototypical HfO2-based RRAM device. In particular, the nee
APA, Harvard, Vancouver, ISO, and other styles
10

Omelianenko, Halyna, Veronika Cherkashyna, and Anton Makarov. "The appropriateness of using electrical energy storage systems to increase the reliability of Ukrainian electrical networks." Bulletin of the National Technical University "KhPI". Series: Energy: Reliability and Energy Efficiency, no. 1(10) (July 9, 2025): 101–6. https://doi.org/10.20998/eree.2025.1(10).332984.

Full text
Abstract:
A study was conducted that allowed to substantiate the expedient use of electric energy storage devices in the electrical networks of Ukraine. The relevance of this study is due to the introduction of renewable energy sources into the electrical networks of Ukraine, which contributes to the need for the accumulation of electric energy. To find ways to solve this problem, an analysis of flywheel, superconducting inductive electric energy storage devices, high-capacity batteries, and supercapacitors was performed. Their operating features, advantages, and disadvantages were considered. From the
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Network Device Compliance"

1

Li, Ze Shi, and Colin Werner. "Ongoing Challenges and Solutions of Managing Data Privacy for Smart Cities." In Smart Cities in Asia. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1701-1_3.

Full text
Abstract:
AbstractSmart cities represent the epitome of utilizing data sourced from sensors and devices in a city to make informed decisions. Facilitating the massive breadth of data are millions and billions of “smart” devices interconnected through high-speed telecommunication networks, so naturally software organizations began specializing in various parts of the smart city data spectrum. In a smart city, new business opportunities are created for software organizations to process, manage, utilize, examine, and generate data. While smart cities support the ability to make rational and prudent decisio
APA, Harvard, Vancouver, ISO, and other styles
2

Gutwald, Benjamin, Freddy Ngankam Ndjiemeni, Martin Barth, and Jörg Franke. "Simulation-Based Efficiency Comparison of Different Mains Configurations for DC Grid Branches for Supplying Production Plants Based on a Rule-Compliant Design." In Lecture Notes in Mechanical Engineering. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-28839-5_49.

Full text
Abstract:
AbstractNumerous research projects are investigating direct current (DC) grids for supplying energy to production plants. The motivation is the higher efficiency and lower material requirements compared to conventional grid structures, as fewer electrical conversion processes occur, regenerative energies can be coupled in more efficiently and recuperation energy can be stored better. The grid form and the associated earthing concept require different protective devices. The publication simulates two possible grid forms and compares the efficiency with an approximated power curve of a productio
APA, Harvard, Vancouver, ISO, and other styles
3

Kitler, Waldemar. "The Cybersecurity Strategy of the Republic of Poland." In Cybersecurity in Poland. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_9.

Full text
Abstract:
AbstractDirective 2016/1148 obliged each Member State to have a national strategy in the field of network and information system security, defining strategic goals and specific policy actions to be implemented. The adoption of the “Cybersecurity Strategy of the Republic of Poland” is also a requirement to implement the provision of Article 68 of the Act of 5 July 2018 on the National Cybersecurity System.The strategy for the years 2019–2024, which defines targets in the field of cybersecurity, set the main goal, i.e. increasing the level of resilience to cyber threats and increasing the level
APA, Harvard, Vancouver, ISO, and other styles
4

Posey, Brien. "Monitoring Device Usage." In GFI Network Security and PCI Compliance Power Tools. Elsevier, 2009. http://dx.doi.org/10.1016/b978-1-59749-285-0.00012-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Xuanzhong, Yanan Zhang, and Xin Ma. "Industrial Internet Communication Architecture Based on Embedded IPv6 Fuzzy Control." In Advances in Transdisciplinary Engineering. IOS Press, 2024. http://dx.doi.org/10.3233/atde231214.

Full text
Abstract:
In order to solve the problems of wrong device address, unreasonable network bandwidth setting and low level of automation control of industrial Internet, a standard verification platform and test system for industrial Internet based on IPv6 fuzzy control are designed. We determine the network architecture of the industrial Internet according to the demand analysis, and complete the design and implementation of the embedded IPv6 protocol stack. We design a fuzzy rule library to describe the relationship between input and output. The corresponding IPv6 communication protocol and mechanism are u
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Azeem, Noor Jhanjhi, Ghassan Ahmed Ali Abdulhabeb, Sayan Kumar Ray, Mustansar Ali Ghazanfar, and Mamoona Humayun. "Securing IoT Devices Using Generative AI Techniques." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5415-5.ch007.

Full text
Abstract:
Generative artificial intelligence (GenAI) is a part of artificial intelligence which has the ability to generate content in various formats ranging from text to videos and images to audio formats. GenAI has the ability to inherently learn from large datasets and can produce results that can be of optimal use in case of cybersecurity. In the current digital landscape, we see a plethora of electronic gadgets connected to this seamless network of devices connected online. These seamless network of devices which were earlier unable to connect due to lack of ip addresses are now able to connect an
APA, Harvard, Vancouver, ISO, and other styles
7

El-Haj, Abdullah, and Shadi Aljawarneh. "A Mechanism for Securing Hybrid Cloud Outsourced Data." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8676-2.ch006.

Full text
Abstract:
The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with
APA, Harvard, Vancouver, ISO, and other styles
8

Alhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch038.

Full text
Abstract:
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDT
APA, Harvard, Vancouver, ISO, and other styles
9

Manivannan, R., Y. V. S. S. Pragathi, and Uday Kumar Kanike. "Integration of Image Processing and IoT for Enhanced Patient Health Checking." In Handbook of Research on Thrust Technologies’ Effect on Image Processing. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8618-4.ch022.

Full text
Abstract:
The integration of image processing methods with IoT devices in healthcare has revolutionized patient health checking procedures, enabling continuous monitoring, automated image analysis, and personalized treatments. This improves diagnostic precision, prompt action, and favorable patient outcomes. Wearable health trackers and medical equipment collect real-time vital sign data, enabling informed judgments. IoT device integration also enables remote access, virtual consultations, and follow-ups, boosting patient engagement and treatment compliance. However, issues like data security, interoper
APA, Harvard, Vancouver, ISO, and other styles
10

Pharow Peter, Lhotska Lenka, and Cheshire Paul. "Personal Portable Devices as Enablers for Advanced pHealth Decision Support and Decision Making Services." In Studies in Health Technology and Informatics. IOS Press, 2013. https://doi.org/10.3233/978-1-61499-268-4-27.

Full text
Abstract:
Mobile devices are becoming more and more important for services offered either directly to individuals, or indirectly as part of a therapeutic or rehabilitation procedure. Representing the work of the EFMI WG “Personal Portable Devices”, this paper offers an introduction to some of the most important technical and privacy-related challenges that arise when introducing mobile sensor or actuator devices (and networks) into health care, wellness, and fitness processes in order to exploit their capability to collect, record and process personal health data. Data processing can
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network Device Compliance"

1

Stanzione, Kaydon. "Airborne Flight Reporting System." In Vertical Flight Society 71st Annual Forum & Technology Display. The Vertical Flight Society, 2015. http://dx.doi.org/10.4050/f-0071-2015-10221.

Full text
Abstract:
This paper addresses the design, development, and operations of a portable wireless flight reporting system applicable for the unique characteristics of vertical flight aircraft. The Airborne Flight Reporting System™ (AFRS) provides an affordable, yet robust and FAA-compliant "black box" for a wide range of air vehicle platforms. AFRS provides mission-critical in-flight information to air and ground crews and posts enroute flight information useful to individuals vested in passenger and cargo transit. AFRS is also applicable to Unmanned Aerial Vehicles (UAVs) and the FAA's NextGen and the Firs
APA, Harvard, Vancouver, ISO, and other styles
2

Prabhu, Nagaraj Lakshmana, Desmond Loy Jia Jun, Putu Andhita Dananjaya, Eng Huat Toh, Wen Siang Lew, and Nagarajan Raghavan. "Exploring the Power – Prediction Accuracy Trade-Off in a Deep Learning Neural Network using Wide Compliance RRAM Device." In 2019 8th International Symposium on Next Generation Electronics (ISNE). IEEE, 2019. http://dx.doi.org/10.1109/isne.2019.8896449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Patrichi, Mugurel. "ARE MOBILE LEARNING DEVICES READY FOR ENTERPRISE DEPLOYMENT?" In eLSE 2012. Editura Universitara, 2012. http://dx.doi.org/10.12753/2066-026x-12-172.

Full text
Abstract:
One of the strong points of mobile learning is considered to be the ability to deploy in corporate environment, for a "learn anywhere" approach. But it is easy to see how employees, once provided with these devices, will want more from them. After all, it is the employees who are the driving force behind the adoption of the smartphones and tablets in organisations. We consider, therefore, that an organisation analyzing the possibility of deploying personal devices for training and on-the-spot assistance, should consider the fact that the employees will want more than to run the training softwa
APA, Harvard, Vancouver, ISO, and other styles
4

Blavette, Anne, Dara L. O’Sullivan, Antony W. Lewis, and Michael G. Egan. "Grid Integration of Wave and Tidal Energy." In ASME 2011 30th International Conference on Ocean, Offshore and Arctic Engineering. ASMEDC, 2011. http://dx.doi.org/10.1115/omae2011-49953.

Full text
Abstract:
Wave and tidal energy provide a renewable source of electricity. However, their inherent fluctuations may have a negative impact on the power quality of a local electrical network. Grid operators assess this impact through the use of dynamic models of the generation units, which are inserted into the overall power system model. Providing these models is a compulsory step for any power generator to procure a grid connection above a specified power capacity. Significant issues were encountered in the wind energy industry regarding the dynamic modelling of devices, among which were model numerica
APA, Harvard, Vancouver, ISO, and other styles
5

Aileni, Raluca maria, Alexandra Ene, George Suciu, and Carmen Mihai. "SOFTWARE APPLICATION FOR TEXTILE INVASIVE DEVICE USED IN ADVANCED MEDICINE." In eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-269.

Full text
Abstract:
This paper presents a software application designed to solve the complex mathematical formulas applied to describe the parameters for textile medical devices used for invasive interventions. The fluid flow mathematical parameters will be used for obtaining an adaptive 3D model for fluid dynamic simulation in the human vessels. The objectives are to define all parameters involved in the process and model the 3D textile structure suitable for use as medical invasive device to replace the damaged blood vessels. The modeling starts from the assumption that the arteries have a perfect tubular struc
APA, Harvard, Vancouver, ISO, and other styles
6

Shrestha, Pradhumna Lal, Michael Hempel, Sushanta Rakshit, Hamid Sharif, John Punwani, and Monique Stewart. "Performance Evaluation of Hybrid Technology Networking for Real-Time Monitoring in Freight Railroad Operations." In 2013 Joint Rail Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/jrc2013-2467.

Full text
Abstract:
Traditional Wireless Sensor Network (WSN) solutions have been deemed insufficient to address the requirements of freight railroad companies to implement real-time monitoring and control of their trains, tracks and wayside equipment. With only ZigBee-based elements, the transmission capabilities of WSN devices are limited in terms of coverage range and throughput. This leads to severe delay and congestion in the network, particularly in railroad scenarios that usually require the nodes to be arranged in linear chain-like topology. In such a multi-hop topology to communicate from one end of a tr
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Yong. "Smart Device and Network Based Control of a Compliant Ankle-Foot-Orthosis." In ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/detc2015-46195.

Full text
Abstract:
Ankle Foot Orthoses (AFO) are externally applied devices that control the foot and ankle joint complex. The goal of this project is to create a smart device and network based mobile control, communicator and mechanical performance analyzer for a prototype AFO, which is powered by artificial pneumatic muscles to aid walking in patients with ankle and foot injuries. The preliminary proof of concept study of the system to improve comfort and offer settings control will be presented. It can potentially provide a higher computing and analyzing power in the design of medical devices by the combinati
APA, Harvard, Vancouver, ISO, and other styles
8

Quill, Tania, and Ruth Lennon. "Automating Legal Compliance Documentation for IoT Devices on the Network." In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT'19). IEEE, 2019. http://dx.doi.org/10.1109/wf-iot.2019.8767346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Song, Jianping Song, Xiuming Zhu, et al. "Wi-HTest: Compliance Test Suite for Diagnosing Devices in Real-Time WirelessHART Network." In 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 2009. http://dx.doi.org/10.1109/rtas.2009.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Upadhyaya, Santosh Kumar, and B. Thangaraju. "A Novel Method for Trusted Audit and Compliance for Network Devices by Using Blockchain." In 2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2022. http://dx.doi.org/10.1109/conecct55679.2022.9865836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!