Using Cloud Transforming for Big Network Management Procedure

Main Article Content

Nikolay Hranov

Abstract

This research is addressed on an overview of a specialized system for the migration/assimilation of a hybrid enterprise network system with the possibility of embedded identification, through a remote encrypted connection to a new cyber ecosystem, without the active process ceasing to function until the first system is finally assimilated into the new one, without being disturbed the balance of its cyber security.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Nikolay Hranov , Tran., “Using Cloud Transforming for Big Network Management Procedure”, IJDCN, vol. 3, no. 5, pp. 1–4, Oct. 2023, doi: 10.54105/ijdcn.F4250.083523.
Section
Articles

How to Cite

[1]
Nikolay Hranov , Tran., “Using Cloud Transforming for Big Network Management Procedure”, IJDCN, vol. 3, no. 5, pp. 1–4, Oct. 2023, doi: 10.54105/ijdcn.F4250.083523.
Share |

References

G. O. Young, “Synthetic structure of industrial networks (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 2014, pp. 15–64.

W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 2003, pp. 123–135.

H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 2015, ch. 4.

B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

Most read articles by the same author(s)

1 2 3 4 > >>