Portada: Infraestructura para la Logística Sustentable 2050
DESTACADO | CPI Propone - Resumen Ejecutivo

Infraestructura para el desarrollo que queremos 2026-2030

Elaborado por el Consejo de Políticas de Infraestructura (CPI), este documento constituye una hoja de ruta estratégica para orientar la inversión y la gestión de infraestructura en Chile. Presenta propuestas organizadas en siete ejes estratégicos, sin centrarse en proyectos específicos, sino en influir en las decisiones de política pública para promover una infraestructura que conecte territorios, genere oportunidades y eleve la calidad de vida de la población.

873   Artículos

« Anterior     Página: 1 de 44     Siguiente »

 
en línea
Irawan Dwi Wahyono,Djoko Saryono,Khoirudin Asfani,Muhammad Ashar,Sunarti Sunarti     Pág. pp. 29 - 40
Computer network security has become an important issue in recent decades, the government and several international organizations have invested in professional education and training for computer network security. In addition, with the increasing inciden... ver más

 
en línea
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano    
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Muaayed Al-Rawi     Pág. 73 - 76
Mobile ad-hoc network (MANET) security is the most significant importance for the infrastructure working of network. Privacy and integrity of the information, network services can be accomplished by guaranteeing that security issues. The mobile ad hoc ne... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Clement Agbeboaye,France O. Akpojedje,Joshua Okoekhian    
There is a geometric growth in the manufacturing and sales of wireless network devices presently. This growth is not connected with the advantages ushered in by wireless network e.g user mobility, the flexibility of the network, enable network connection... ver más

 
en línea
Rong Shi,Wang Xi     Pág. pp. 48 - 59
In order to improve the security of wireless sensor network, the trust model of wireless sensor network based on cloud theory is established. The similarity comparison algorithm is introduced. Trust is expressed as a quantitative value. The new update fu... ver más
Revista: International Journal of Online Engineering (iJOE)    Formato: Electrónico

 
en línea
Shuang Xu,Tong Zhou     Pág. pp. 151 - 164
In order to study the intelligent buildings, the intelligent building network security of wireless sensor was explored. Because of its advantages of low cost, easy installation, low maintenance and update cost, wireless sensor network system was applied ... ver más
Revista: International Journal of Online Engineering (iJOE)    Formato: Electrónico

 
en línea
Samuel Chapman, Richard Smith, Leandros Maglaras and Helge Janicke    
-
Revista: Journal of Sensor and Actuator Networks    Formato: Electrónico

 
en línea
Fahad M. Alotaibi and Vassilios G. Vassilakis    
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry    
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yi Zhang, Lanxin Qiu, Yangzhou Xu, Xinjia Wang, Shengjie Wang, Agyemang Paul and Zhefu Wu    
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial of Service (DDoS) attacks due to centralized control and flow-table constraints in network devices. To overcome this limitation, we introduce a multi-path routing alg... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xianlong Dai, Guang Cheng, Ziyang Yu, Ruixing Zhu and Yali Yuan    
The results of this paper can be used in the fields related to network measurement, especially in the fields of network traffic sampling, network traffic measurement, and finding top-k elephant flows.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ricardo Severino, José Simão, Nuno Datia and António Serrador    
Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that attacker... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Seongmin Park, Byungsun Cho, Dowon Kim and Ilsun You    
Research to deal with distributed denial of service (DDoS) attacks was kicked off from long ago and has seen technological advancement along with an extensive 5G footprint. Prior studies, and still newer ones, in the realm of DDoS attacks in the 5G envir... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra and Praveen Lalwani    
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jie Xu and Wei Ding    
Super points detection plays an important role in network research and application. With the increase of network scale, distributed super points detection has become a hot research topic. The key point of super points detection in a multi-node distribute... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim    
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Gabriel Arquelau Pimenta Rodrigues, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba and Tai-Hoon Kim    
Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its n... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ramon Martín de Pozuelo, Agustín Zaballos, Joan Navarro and Guiomar Corral    
The smart grid can be seen as a hybrid system composed by many systems. From a large scale point of view, it combines the electric power system itself and a heterogeneous information and communication technology (ICT) infrastructure. Additionally, these ... ver más
Revista: Energies    Formato: Electrónico

 
en línea
Ramon Martín de Pozuelo, Agustín Zaballos, Joan Navarro and Guiomar Corral    
The smart grid can be seen as a hybrid system composed by many systems. From a large scale point of view, it combines the electric power system itself and a heterogeneous information and communication technology (ICT) infrastructure. Additionally, these ... ver más
Revista: Energies    Formato: Electrónico

 
en línea
Tamim Al Mahmud     Pág. 18 - 26
Recent advancement and grown up technologies has enabled the development and implementation of low-cost, energy efficient and versatile sensor networks. Sensor networks are built up with sensors that have the ability to sense fiscal or environmental prop... ver más
Revista: Engineering International    Formato: Electrónico

« Anterior     Página: 1 de 44     Siguiente »