Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- rfcJuly 2023
RFC 9433: Segment Routing over IPv6 for the Mobile User Plane
This document discusses the applicability of Segment Routing over IPv6 (SRv6) to the user plane of mobile networks. The network programming nature of SRv6 accomplishes mobile user-plane functions in a simple manner. The statelessness of SRv6 and its ...
- ArticleAugust 2022
A Survey of Pretrained Language Models
Knowledge Science, Engineering and ManagementPages 442–456https://doi.org/10.1007/978-3-031-10986-7_36AbstractWith the emergence of Pretrained Language Models (PLMs) and the success of large-scale PLMs such as BERT and GPT, the field of Natural Language Processing (NLP) has achieved tremendous development. Therefore, nowadays, PLMs have become an ...
- research-articleJanuary 2022
Impact of green human resource management practices on employee engagement from the perspective of banking employees
International Journal of Information Systems and Change Management (IJISCM), Volume 13, Issue 2Pages 148–165https://doi.org/10.1504/ijiscm.2022.129261The scope of green human resource management (GHRM) has gotten intense concern from researchers over the last decade. However, little work has been accomplished in taking GHRM practices to attain distinct goals of the workplace, such as employee ...
- research-articleMay 2020
Relationship between Dynamics of Structures and Dynamics of Hydrogen Bonds in Hras-GTP/GDP Complex
ICBBB '20: Proceedings of the 2020 10th International Conference on Bioscience, Biochemistry and BioinformaticsPages 1–7https://doi.org/10.1145/3386052.3386059Hras protein is an intermediate for signals of cell proliferation and cell differentiation when Hras combines with guanosine triphosphate (GTP). In ordinary cells, GTP combined with Hras is hydrolyzed to guanosine diphosphate (GDP), and the structures ...
- articleOctober 2016
SRMIP: A Software-Defined RAN Mobile IP Framework for Real Time Applications in Wide Area Motion
International Journal of Mobile Computing and Multimedia Communications (IJMCMC-IGI), Volume 7, Issue 4Pages 28–49https://doi.org/10.4018/IJMCMC.2016100103Existing mobility protocols suffer from multimedia and data transfer disruption when crossing cities' boundaries by trains or cars. Session continuity in wide area motion is an officially raised goal by 5G-PPP vision. This research adopts 5G methodology ...
- ArticleOctober 2012
Moving the mobile Evolved Packet Core to the cloud
WIMOB '12: Proceedings of the 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)Pages 784–791https://doi.org/10.1109/WiMOB.2012.6379165In this paper, we describe an evolution of the mobile Evolved Packet Core (EPC) utilizing Software Defined Networking (SDN) that allows the EPC control plane to be moved into a data center. The EPC is a mobile aggregation network standardized by 3GPP ...
- ArticleDecember 2010
Securing GPRS Tunnel Protocol in 3G Core Network
CIS '10: Proceedings of the 2010 International Conference on Computational Intelligence and SecurityPages 469–473https://doi.org/10.1109/CIS.2010.108The security concerns in 3G network, especially the core network, is far from being satisfied. As the most important protocol in the 3G core network, GPRS Tunnel Protocol (GTP) is quite vulnerable to attacks in the flat, full IP environment. Solving ...
- ArticleApril 2010
GTP Security in 3G Core Network
NSWCTC '10: Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01Pages 15–19https://doi.org/10.1109/NSWCTC.2010.12Nowadays, 3G netowrk plays a very important role in mobile communication system. But the security concern of such network, especially the core network, is far from being satisfied. GPRS Tunnel Protocol(GTP), which is one of the key protocols in the core ...
- ArticleAugust 2009
Application of Bloom Filter for GTP Stateful Inspection in Network Processor
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02Pages 589–592https://doi.org/10.1109/IAS.2009.112The 3rd Generation network rely on a key protocol—the GPRS Tunneling Protocol (GTP). However, GTP itself is not designed to be secure. So it is necessary to inspect the legal GTP channels and protect the backbone. Because a great deal of GTP-U packets ...
- ArticleAugust 2008
Firewall Based Scheme to Prevent GPRS Overbilling
CCCM '08: Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management - Volume 02Pages 595–598https://doi.org/10.1109/CCCM.2008.18The lack of inherent security in the GPRS tunneling protocol (GTP) leaves security vulnerabilities in GPRS networks. A novel scheme to defend the network against Overbilling is proposed. The scheme only requires a dynamic memory in a GTP firewall to ...